CVE-2007-1765
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/03/2007
Last modified:
09/04/2025
Description
Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this issue might be a duplicate of CVE-2007-0038; if so, then use CVE-2007-0038 instead of this identifier.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:microsoft:windows_2000:*:*:*:*:advanced_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:*:*:*:datacenter_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:*:*:*:professional:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:*:*:ja:server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:advanced_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:datacenter_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:professional:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:advanced_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:datacenter_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:advanced_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:datacenter_server:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:professional:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:server:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/
- http://research.eeye.com/html/alerts/zeroday/20070328.html
- http://vil.nai.com/vil/content/v_141860.htm
- http://www.avertlabs.com/research/blog/?p=230
- http://www.avertlabs.com/research/blog/?p=233
- http://www.microsoft.com/technet/security/advisory/935423.mspx
- http://www.securityfocus.com/archive/1/464287/100/0/threaded
- http://www.securityfocus.com/archive/1/464345/100/0/threaded
- http://www.securityfocus.com/bid/23194
- http://www.securitytracker.com/id?1017827=
- http://www.vupen.com/english/advisories/2007/1151
- http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/
- http://research.eeye.com/html/alerts/zeroday/20070328.html
- http://vil.nai.com/vil/content/v_141860.htm
- http://www.avertlabs.com/research/blog/?p=230
- http://www.avertlabs.com/research/blog/?p=233
- http://www.microsoft.com/technet/security/advisory/935423.mspx
- http://www.securityfocus.com/archive/1/464287/100/0/threaded
- http://www.securityfocus.com/archive/1/464345/100/0/threaded
- http://www.securityfocus.com/bid/23194
- http://www.securitytracker.com/id?1017827=
- http://www.vupen.com/english/advisories/2007/1151



