98 Guy
2007-04-04 00:20:06 UTC
Macro$haft issued a fix for this item back in 2005 (I think) but it
only addressed half of the potential vulnerability (ie it was only a
half-baked solution).
What I'm not clear on is if Win-9x has any built-in associations for
these ANI files. I've searched my system and can't find any .ani
files (should I?).
Zert has a webpage containing a benign version of the ani exploit that
will crash your system if it's vulnerable:
(warning - don't click on this link unless you are prepared to
re-start your system)
http://zert.isotf.org/tests/testani.htm
I've tried it from a few win-98 machines and they aren't affected by
the exploit (in other words, my win-98 systems don't crash).
I don't think win-98 has any built-in associations for .ANI files (and
I don't have any ani files on my system).
The webpage above contains xpsp2_2180.jpg and xpsp2_2622.jpg. They
appear (internally) to identify themselves as "RIFF" files (Resource
Interchange File Format). When submitted to Virus Total, those files
are identified as various forms of ANI exploits (viral, trojan, etc).
If an OS doesn't have any built-in association for .ani (or .riff?)
files, then I can't see how the exploit can work.
Keep in mind that MS has often (in the past) lumped Win-9x into lists
of OS's that were vulnerable to this or that exploit when in fact they
weren't.
Details:
Windows .ANI LoadAniIcon Stack Overflow
* [CVE-2007-1765]
*
* Description:
* A vulnerability has been identified in Microsoft Windows,
* which could be exploited by remote attackers to take complete
* control of an affected system. This issue is due to a stack
* overflow error within the "LoadAniIcon()" [user32.dll] function
* when rendering cursors, animated cursors or icons with a
* malformed header, which could be exploited by remote attackers
* to execute arbitrary commands by tricking a user into visiting
* a malicious web page or viewing an email message containing a
* specially crafted ANI file.
I've just looked at user32.dll with dependency walker and don't see a
"LoadAniIcon" in the function list.
only addressed half of the potential vulnerability (ie it was only a
half-baked solution).
What I'm not clear on is if Win-9x has any built-in associations for
these ANI files. I've searched my system and can't find any .ani
files (should I?).
Zert has a webpage containing a benign version of the ani exploit that
will crash your system if it's vulnerable:
(warning - don't click on this link unless you are prepared to
re-start your system)
http://zert.isotf.org/tests/testani.htm
I've tried it from a few win-98 machines and they aren't affected by
the exploit (in other words, my win-98 systems don't crash).
I don't think win-98 has any built-in associations for .ANI files (and
I don't have any ani files on my system).
The webpage above contains xpsp2_2180.jpg and xpsp2_2622.jpg. They
appear (internally) to identify themselves as "RIFF" files (Resource
Interchange File Format). When submitted to Virus Total, those files
are identified as various forms of ANI exploits (viral, trojan, etc).
If an OS doesn't have any built-in association for .ani (or .riff?)
files, then I can't see how the exploit can work.
Keep in mind that MS has often (in the past) lumped Win-9x into lists
of OS's that were vulnerable to this or that exploit when in fact they
weren't.
Details:
Windows .ANI LoadAniIcon Stack Overflow
* [CVE-2007-1765]
*
* Description:
* A vulnerability has been identified in Microsoft Windows,
* which could be exploited by remote attackers to take complete
* control of an affected system. This issue is due to a stack
* overflow error within the "LoadAniIcon()" [user32.dll] function
* when rendering cursors, animated cursors or icons with a
* malformed header, which could be exploited by remote attackers
* to execute arbitrary commands by tricking a user into visiting
* a malicious web page or viewing an email message containing a
* specially crafted ANI file.
I've just looked at user32.dll with dependency walker and don't see a
"LoadAniIcon" in the function list.