oval
via4
|
accepted | 2011-05-16T04:02:40.130-04:00 | class | vulnerability | contributors | name | Christine Walzer | organization | The MITRE Corporation |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." | family | windows | id | oval:org.mitre.oval:def:2956 | status | accepted | submitted | 2005-01-14T12:00:00.000-04:00 | title | LoadImage Cursor and Icon Format Handling Vulnerability (XP) | version | 70 |
accepted | 2008-03-24T04:00:26.990-04:00 | class | vulnerability | contributors | name | Christine Walzer | organization | The MITRE Corporation |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
| definition_extensions | comment | Microsoft Windows NT is installed | oval | oval:org.mitre.oval:def:36 |
| description | Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." | family | windows | id | oval:org.mitre.oval:def:3097 | status | accepted | submitted | 2005-01-14T12:00:00.000-04:00 | title | LoadImage Cursor and Icon Format Handling Vulnerability (Terminal Server) | version | 76 |
accepted | 2007-11-13T12:01:12.066-05:00 | class | vulnerability | contributors | name | Christine Walzer | organization | The MITRE Corporation |
name | Jeff Cheng | organization | Opsware, Inc. |
| description | Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." | family | windows | id | oval:org.mitre.oval:def:3220 | status | accepted | submitted | 2005-01-14T12:00:00.000-04:00 | title | LoadImage Cursor and Icon Format Handling Vulnerability (Server 2003) | version | 67 |
accepted | 2008-03-24T04:00:28.971-04:00 | class | vulnerability | contributors | name | Christine Walzer | organization | The MITRE Corporation |
name | John Hoyland | organization | Centennial Software |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
| definition_extensions | comment | Microsoft Windows NT is installed | oval | oval:org.mitre.oval:def:36 |
| description | Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." | family | windows | id | oval:org.mitre.oval:def:3355 | status | accepted | submitted | 2005-01-14T12:00:00.000-04:00 | title | LoadImage Cursor and Icon Format Handling Vulnerability (NT 4.0) | version | 77 |
accepted | 2011-05-16T04:03:02.877-04:00 | class | vulnerability | contributors | name | Christine Walzer | organization | The MITRE Corporation |
name | Andrew Buttner | organization | The MITRE Corporation |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Shane Shaffer | organization | G2, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." | family | windows | id | oval:org.mitre.oval:def:4671 | status | accepted | submitted | 2005-01-14T12:00:00.000-04:00 | title | LoadImage Cursor and Icon Format Handling Vulnerability (Windows 2000) | version | 72 |
|