Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."
2004-12-31T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 5.1 (MEDIUM)
AV:N/AC:H/Au:N/C:P/I:P/A:P
4.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_2000 | * | Yes |
Operating System | microsoft | windows_2000 | * | Yes |
Operating System | microsoft | windows_2000 | * | Yes |
Operating System | microsoft | windows_2000 | * | Yes |
Operating System | microsoft | windows_2000 | * | Yes |
Operating System | microsoft | windows_2003_server | r2 | Yes |
Operating System | microsoft | windows_nt | * | Yes |
Operating System | microsoft | windows_xp | * | Yes |
Operating System | microsoft | windows_xp | * | Yes |