CVE-2007-0038
Published Mar 30, 2007
Last updated 6 years ago
Overview
- Description
- Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83E7C4A0-78CF-4B56-82BF-EC932BDD8ADF" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:gold:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B058588A-88F3-4789-8EA9-0D37447B08CA" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:gold:*:itanium:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C9649DB-D417-4CCC-9F61-685ECB355AD7" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:gold:*:x64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "722526B1-12E3-42E7-95ED-84A86D0C189A" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "644E2E89-F3E3-4383-B460-424D724EE62F" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D11FC8D-59DD-4CAC-B4D3-DABB7A9903F1" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "377F7D0C-6B44-4B90-BF90-DAF959880C6D" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D21D1DFE-F61B-407E-A945-4F42F86947B0" }, { "criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3461CEA0-6CCF-4AA9-B83A-420E1310C83C" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D34A558F-A656-43EB-AC52-C3710F77CDD8" }, { "criteria": "cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9DC56EB-EDC4-4DFE-BA9B-B17FF4A91734" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74EE55A2-6020-4591-9F15-80E57D19207C" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543" }, { "criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AB9988B-5A9C-4F6D-BCCC-4D03AC6E4CF9" } ], "operator": "OR" } ] } ]