A vulnerability exists in the way the Microsoft Windows kernel processes animated cursor (.ani) files with a rate number set to zero. Exploitation of this vulnerability may allow a remote attacker to cause a denial-of-service condition.
A vulnerability exists in the way the Microsoft Windows kernel processes .ani files. These files contain animated graphics for icons and cursors. According to public reports, if the Windows kernel is supplied a .ani file with a rate number set to zero, it doesn't properly handle the .ani file. As a result, the kernel may crash or consume 100% of the system resources resulting in a denial-of-service condition.
.ani files are parsed when the containing folder is opened or it is used as a cursor. In addition, Internet Explorer can process .ani files in HTML documents, so web pages and HTML email messages can also trigger this vulnerability. Other web browsers or programs that render HTML may also act as attack vectors.
If a remote attacker can persuade a user to access a specially crafted .ani file, the attacker may be able to crash that user's system.
This vulnerability was publicly reported by Sylvain Bruyere.
This document was written by Jeff Gennari.
|Date First Published:||2005-01-07|
|Date Last Updated:||2005-03-14 15:35 UTC|