jenhaoliu
|
分享:
x0
|
[漏洞修補] Microsoft Windows User32.DLL ANI File Header Handling Stack
漏洞名稱: Microsoft Windows User32.DLL ANI File Header Handling Stack-Based Buffer Overflow Vulnerability 漏洞編號: ICST-CA-2005-012 漏洞說明: 微軟視窗系統的ANI (animated cursor files) 處理程式含有堆疊緩衝區溢位的漏洞。
該漏洞存在於user32.dll中的ANI檔案標頭。
利用該漏洞,駭客可以強制指定系統執行駭客植入的指令。所有含IE元件的軟體包含Microsoft Internet Explorer、Word、Excel、PowerPoint、Outlook、Outlook Express和Windows Shell都會受到影響。
影響平台: Microsoft Windows 2000 Advanced Server SP4 Microsoft Windows 2000 Advanced Server SP3 Microsoft Windows 2000 Advanced Server SP2 Microsoft Windows 2000 Advanced Server SP1 Microsoft Windows 2000 Advanced Server Microsoft Windows 2000 Professional SP4 Microsoft Windows 2000 Professional SP3 Microsoft Windows 2000 Professional SP2 Microsoft Windows 2000 Professional SP1 Microsoft Windows 2000 Professional Microsoft Windows 2000 Server SP4 Microsoft Windows 2000 Server SP3 Microsoft Windows 2000 Server SP2 Microsoft Windows 2000 Server SP1 Microsoft Windows 2000 Server Microsoft Windows 95 Microsoft Windows 98 Microsoft Windows 98SE Microsoft Windows ME Microsoft Windows NT Enterprise Server 4.0 SP6a Microsoft Windows NT Enterprise Server 4.0 SP6 Microsoft Windows NT Enterprise Server 4.0 SP5 Microsoft Windows NT Enterprise Server 4.0 SP4 Microsoft Windows NT Enterprise Server 4.0 SP3 Microsoft Windows NT Enterprise Server 4.0 SP2 Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0 Microsoft Windows NT Server 4.0 SP6a Microsoft Windows NT Server 4.0 SP6 Microsoft Windows NT Server 4.0 SP5 Microsoft Windows NT Server 4.0 SP4 Microsoft Windows NT Server 4.0 SP3 Microsoft Windows NT Server 4.0 SP2 Microsoft Windows NT Server 4.0 SP1 Microsoft Windows NT Server 4.0 Microsoft Windows NT Terminal Server 4.0 SP6 Microsoft Windows NT Terminal Server 4.0 SP5 Microsoft Windows NT Terminal Server 4.0 SP4 Microsoft Windows NT Terminal Server 4.0 SP3 Microsoft Windows NT Terminal Server 4.0 SP2 Microsoft Windows NT Terminal Server 4.0 SP1 Microsoft Windows NT Terminal Server 4.0 Microsoft Windows NT Workstation 4.0 SP6a Microsoft Windows NT Workstation 4.0 SP6 Microsoft Windows NT Workstation 4.0 SP5 Microsoft Windows NT Workstation 4.0 SP4 Microsoft Windows NT Workstation 4.0 SP3 Microsoft Windows NT Workstation 4.0 SP2 Microsoft Windows NT Workstation 4.0 SP1 Microsoft Windows NT Workstation 4.0 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows Server 2003 Datacenter Edition 64-bit Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Enterprise Edition 64-bit Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP 64-bit Edition Microsoft Windows XP 64-bit Edition Version 2003 SP1 Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows XP Embedded SP1 Microsoft Windows XP Embedded Microsoft Windows XP Home SP1 Microsoft Windows XP Home Microsoft Windows XP Media Center Edition SP1 Microsoft Windows XP Media Center Edition Microsoft Windows XP Professional SP1 Microsoft Windows XP Professional Microsoft Windows XP Tablet PC Edition SP1 Microsoft Windows XP Tablet PC Edition 影響狀況: 系統會被強迫執行駭客植入的指令。
解決方案: 下面是不受影響的版本: Microsoft Windows XP Home SP2 Microsoft Windows XP Media Center Edition SP2 Microsoft Windows XP Professional SP2 Microsoft Windows XP Tablet PC Edition SP2
參考資料: Microsoft Windows User32.DLL ANI File Header Handling Stack-Based Buffer Overflow Vulnerability
|