Rapid7 Vulnerability & Exploit Database

Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (HTTP)

Back to Search

Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (HTTP)



This module exploits a buffer overflow vulnerability in the LoadAniIcon() function in USER32.dll. The flaw can be triggered through Internet Explorer 6 and 7 by using the CURSOR style sheet directive to load a malicious .ANI file. The module can also exploit Mozilla Firefox by using a UNC path in a moz-icon URL and serving the .ANI file over WebDAV. The vulnerable code in USER32.dll will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.


  • hdm <x@hdm.io>
  • skape <mmiller@hick.org>
  • Solar Eclipse <solareclipse@phreedom.org>




Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/browser/ms07_017_ani_loadimage_chunksize
msf exploit(ms07_017_ani_loadimage_chunksize) > show targets
msf exploit(ms07_017_ani_loadimage_chunksize) > set TARGET < target-id >
msf exploit(ms07_017_ani_loadimage_chunksize) > show options
    ...show and set options...
msf exploit(ms07_017_ani_loadimage_chunksize) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security