Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2004-1049

CVE information

Published

17 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability.".

CVSSv2.0 Score

Severity
Medium
Base Score
5.1/10
Exploit Score
4.9/10
Access Vector
Network
Access Complexity
High
Authentication Required
None
Impact Score
6.4/10
Confidentiality Impact
Partial
Availability Impact
Partial
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*
  Yes
- -