Vulnerability in Windows Animated Cursor Handling
A few days ago Microsoft posted Security Advisory (935423). Microsoft is investigating new public reports of attacks exploiting a vulnerability in the way Microsoft Windows handles animated cursor (.ani) files. In order for this attack to be carried out, a user must either visit a Web site that contains a Web page that is used to exploit the vulnerability or view a specially crafted e-mail message or email attachment sent to them by an attacker.
- Mitigating Factors for Animated Cursor Vulnerability:
- if you are using Internet Explorer 7 on Windows Vista you are protected from currently known web based attacks due to Internet Explorer 7.0 protected mode.
- If you are reading email in Outlook 2007 you are protected regardless of if you are reading the mail as plain text or not.
- If you are reading email using Windows Mail on Vista you are protected as long are not forwarding or replying to the attackers email.
- Regardless of if you are reading your mail in plain text on Outlook Express you are not protected.
For more detailed information see: Microsoft Security Advisory (935423).
MSRC Blog: Microsoft Security Advisory 935423 Posted
MSRC Blog: Update on Microsoft Security Advisory 935423