jenhaoliu
|
分享:
x0
|
[漏洞修补] Microsoft Windows User32.DLL ANI File Header Handling Stack
漏洞名称: Microsoft Windows User32.DLL ANI File Header Handling Stack-Based Buffer Overflow Vulnerability 漏洞编号: ICST-CA-2005-012 漏洞说明: 微软视窗系统的ANI (animated cursor files) 处理程式含有堆叠缓冲区溢位的漏洞。
该漏洞存在于user32.dll中的ANI档案标头。
利用该漏洞,骇客可以强制指定系统执行骇客植入的指令。所有含IE元件的软体包含Microsoft Internet Explorer、Word、Excel、PowerPoint、Outlook、Outlook Express和Windows Shell都会受到影响。
影响平台: Microsoft Windows 2000 Advanced Server SP4 Microsoft Windows 2000 Advanced Server SP3 Microsoft Windows 2000 Advanced Server SP2 Microsoft Windows 2000 Advanced Server SP1 Microsoft Windows 2000 Advanced Server Microsoft Windows 2000 Professional SP4 Microsoft Windows 2000 Professional SP3 Microsoft Windows 2000 Professional SP2 Microsoft Windows 2000 Professional SP1 Microsoft Windows 2000 Professional Microsoft Windows 2000 Server SP4 Microsoft Windows 2000 Server SP3 Microsoft Windows 2000 Server SP2 Microsoft Windows 2000 Server SP1 Microsoft Windows 2000 Server Microsoft Windows 95 Microsoft Windows 98 Microsoft Windows 98SE Microsoft Windows ME Microsoft Windows NT Enterprise Server 4.0 SP6a Microsoft Windows NT Enterprise Server 4.0 SP6 Microsoft Windows NT Enterprise Server 4.0 SP5 Microsoft Windows NT Enterprise Server 4.0 SP4 Microsoft Windows NT Enterprise Server 4.0 SP3 Microsoft Windows NT Enterprise Server 4.0 SP2 Microsoft Windows NT Enterprise Server 4.0 SP1 Microsoft Windows NT Enterprise Server 4.0 Microsoft Windows NT Server 4.0 SP6a Microsoft Windows NT Server 4.0 SP6 Microsoft Windows NT Server 4.0 SP5 Microsoft Windows NT Server 4.0 SP4 Microsoft Windows NT Server 4.0 SP3 Microsoft Windows NT Server 4.0 SP2 Microsoft Windows NT Server 4.0 SP1 Microsoft Windows NT Server 4.0 Microsoft Windows NT Terminal Server 4.0 SP6 Microsoft Windows NT Terminal Server 4.0 SP5 Microsoft Windows NT Terminal Server 4.0 SP4 Microsoft Windows NT Terminal Server 4.0 SP3 Microsoft Windows NT Terminal Server 4.0 SP2 Microsoft Windows NT Terminal Server 4.0 SP1 Microsoft Windows NT Terminal Server 4.0 Microsoft Windows NT Workstation 4.0 SP6a Microsoft Windows NT Workstation 4.0 SP6 Microsoft Windows NT Workstation 4.0 SP5 Microsoft Windows NT Workstation 4.0 SP4 Microsoft Windows NT Workstation 4.0 SP3 Microsoft Windows NT Workstation 4.0 SP2 Microsoft Windows NT Workstation 4.0 SP1 Microsoft Windows NT Workstation 4.0 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows Server 2003 Datacenter Edition 64-bit Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Enterprise Edition 64-bit Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP 64-bit Edition Microsoft Windows XP 64-bit Edition Version 2003 SP1 Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows XP Embedded SP1 Microsoft Windows XP Embedded Microsoft Windows XP Home SP1 Microsoft Windows XP Home Microsoft Windows XP Media Center Edition SP1 Microsoft Windows XP Media Center Edition Microsoft Windows XP Professional SP1 Microsoft Windows XP Professional Microsoft Windows XP Tablet PC Edition SP1 Microsoft Windows XP Tablet PC Edition 影响状况: 系统会被强迫执行骇客植入的指令。
解决方案: 下面是不受影响的版本: Microsoft Windows XP Home SP2 Microsoft Windows XP Media Center Edition SP2 Microsoft Windows XP Professional SP2 Microsoft Windows XP Tablet PC Edition SP2
参考资料: Microsoft Windows User32.DLL ANI File Header Handling Stack-Based Buffer Overflow Vulnerability
|