High-risk ANI mouse pointer vulnerability Unofficial immune patch
Please install this patch as soon as possible.
Thanks for the delivery
This patch is a patch developed by the unofficial organization EEYE for this vulnerability (author: Derek Soeder - eEye Digital Security). After testing, this patch can solve the problems caused by this vulnerability. Installing this patch can eliminate the problems caused by this vulnerability. It is recommended that you install this patch to prevent malicious programs from jeopardizing your system.
Note: The system will be restarted automatically after the patch is installed. Save your work before installation to prevent important information from being lost. After the program is installed, an eEye Windows.ANI Zero-Day Patch project will be generated in the Start Menu -> Program. If the patch is no longer needed, it can be uninstalled here. After the official patch KB935423 is installed (this patch has not been released yet), the unofficial program can be uninstalled.
After installation, a "eEye Windows Animated Cursor Patch" will be added to the Start Menu -> Programs -> Startup, and the App_init item will be established. After restarting, 360 prompts the system to add a program called eEye Windows Animated Cursor Patch to the startup item, and an app_init item. eEye Windows Animated Cursor Patch Checker is a program used to detect patch updates. There is no harm. You can choose to keep it or delete it. The app_init item of the app_init item is the key to its work. Please allow this action, otherwise the patch will not take effect.
Microsoft Windows has a buffer overflow vulnerability when processing deformed animation icon files (.ani). Remote attackers may use this vulnerability to control the user's machine. Microsoft Windows does not correctly verify the size specified in the ANI header when processing deformed files (.ani), resulting in a stack overflow vulnerability. If the user is deceived to access a malicious site or open a malicious email message using IE, this overflow will be triggered, causing arbitrary code to be executed. Please note that Windows Explorer also It will process some ANI files with file extensions, such as .ani, .cur, .ico, etc. The affected systems include: all versions of Microsoft Windows Vista; all versions of Microsoft Windows XP; all versions of Microsoft Windows Server 2003 SP1; all versions of Microsoft Windows Server 2003; all versions of Microsoft Windows 2000.
At present, many websites at home and abroad have begun to use this vulnerability to spread malware, *s and worms. The exploitation program of this vulnerability is usually disguised as a picture. As long as you click on a website or email with malicious code pictures, you will be infected with a malicious program, and whether it is IE6 or IE7, or non-IE browsers such as FireFoxOpera.
Whether it is the Windows NT2000XP2003Vista operating system, there is a possibility of being infected. Other network application software such as QQ, MSN, various email software, RSS software, etc. may also be affected by the vulnerability. Since multiple versions of the vulnerability use a lot of tricks, most antivirus software, anti-vulnerability software and active defense software will be bypassed and invalidated. This has great harm to the user's machine. Once a machine without patches opens a website or email containing malicious code, viruses or malicious programs will immediately run in the background quietly, causing the user's machine to steal account *s, malicious adware, worms, etc. without any reaction.
Installation package MD5: 4a997d7da0188acb0bd4850f8c812b80
Size: 345912 bytes
download:
http://dl./
Please install this patch as soon as possible.
Thanks for the delivery
This patch is a patch developed by the unofficial organization EEYE for this vulnerability (author: Derek Soeder - eEye Digital Security). After testing, this patch can solve the problems caused by this vulnerability. Installing this patch can eliminate the problems caused by this vulnerability. It is recommended that you install this patch to prevent malicious programs from jeopardizing your system.
Note: The system will be restarted automatically after the patch is installed. Save your work before installation to prevent important information from being lost. After the program is installed, an eEye Windows.ANI Zero-Day Patch project will be generated in the Start Menu -> Program. If the patch is no longer needed, it can be uninstalled here. After the official patch KB935423 is installed (this patch has not been released yet), the unofficial program can be uninstalled.
After installation, a "eEye Windows Animated Cursor Patch" will be added to the Start Menu -> Programs -> Startup, and the App_init item will be established. After restarting, 360 prompts the system to add a program called eEye Windows Animated Cursor Patch to the startup item, and an app_init item. eEye Windows Animated Cursor Patch Checker is a program used to detect patch updates. There is no harm. You can choose to keep it or delete it. The app_init item of the app_init item is the key to its work. Please allow this action, otherwise the patch will not take effect.
Microsoft Windows has a buffer overflow vulnerability when processing deformed animation icon files (.ani). Remote attackers may use this vulnerability to control the user's machine. Microsoft Windows does not correctly verify the size specified in the ANI header when processing deformed files (.ani), resulting in a stack overflow vulnerability. If the user is deceived to access a malicious site or open a malicious email message using IE, this overflow will be triggered, causing arbitrary code to be executed. Please note that Windows Explorer also It will process some ANI files with file extensions, such as .ani, .cur, .ico, etc. The affected systems include: all versions of Microsoft Windows Vista; all versions of Microsoft Windows XP; all versions of Microsoft Windows Server 2003 SP1; all versions of Microsoft Windows Server 2003; all versions of Microsoft Windows 2000.
At present, many websites at home and abroad have begun to use this vulnerability to spread malware, *s and worms. The exploitation program of this vulnerability is usually disguised as a picture. As long as you click on a website or email with malicious code pictures, you will be infected with a malicious program, and whether it is IE6 or IE7, or non-IE browsers such as FireFoxOpera.
Whether it is the Windows NT2000XP2003Vista operating system, there is a possibility of being infected. Other network application software such as QQ, MSN, various email software, RSS software, etc. may also be affected by the vulnerability. Since multiple versions of the vulnerability use a lot of tricks, most antivirus software, anti-vulnerability software and active defense software will be bypassed and invalidated. This has great harm to the user's machine. Once a machine without patches opens a website or email containing malicious code, viruses or malicious programs will immediately run in the background quietly, causing the user's machine to steal account *s, malicious adware, worms, etc. without any reaction.
Installation package MD5: 4a997d7da0188acb0bd4850f8c812b80
Size: 345912 bytes
download:
http://dl./