module

Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (HTTP)

Disclosed
2007-03-28
Created
2018-05-30

Description

This module exploits a buffer overflow vulnerability in the
LoadAniIcon() function in USER32.dll. The flaw can be triggered through
Internet Explorer 6 and 7 by using the CURSOR style sheet directive
to load a malicious .ANI file. The module can also exploit Mozilla
Firefox by using a UNC path in a moz-icon URL and serving the .ANI file
over WebDAV. The vulnerable code in USER32.dll will catch any
exceptions that occur while the invalid cursor is loaded, causing the
exploit to silently fail when the wrong target has been chosen.

This vulnerability was discovered by Alexander Sotirov of Determina
and was rediscovered, in the wild, by McAfee.

Authors

hdm x@hdm.io
skape mmiller@hick.org
Solar Eclipse solareclipse@phreedom.org

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/browser/ms07_017_ani_loadimage_chunksize
msf exploit(ms07_017_ani_loadimage_chunksize) > show targets
...targets...
msf exploit(ms07_017_ani_loadimage_chunksize) > set TARGET < target-id >
msf exploit(ms07_017_ani_loadimage_chunksize) > show options
...show and set options...
msf exploit(ms07_017_ani_loadimage_chunksize) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.