December 23 , Jiangmin Anti-Virus Center monitored the business , Windows system, three new vulnerabilities and also the technical particulars to become printed around the internet. They're : LoadImage API heap overflow vulnerability , Winhlp32.exe heap overflow and crash the kernel file dealing with ANI cursor vulnerability.
Which , LoadImage heap overflow vulnerability inside the JPEG use and a few time back a similar vulnerability , a user browsing a Internet page to exploit this vulnerability , which might be considered a virus or malware infection. Additionally to Windows XP SP2 , the other pretty much all NT working methods ( such as Windows NT,
Microsoft Office 2010 Professional, Windows 2000 SP0 ~ SP4, Windows XP SP0 ~ SP1 and Windows 2003) are affected by this vulnerability .
Winhlp32.exe vulnerability affects Windows XP SP2 , including just about all Windows running systems. Exploit this vulnerability , a hacker can create a special Aid file (. hlp files) , triggering an overflow that may possibly result in arbitrary code execution.
ANI vulnerability doesn't affect the processing core collapse from the Windows XP SP2 technique, making use of this vulnerability , a remote attacker could make the Web page, immediately attacked the system reboot or blue display screen kernel deadlock .
Jiangmin anti-virus experts, this 3 -level vulnerabilities really are a severe danger , Jiangmin companies are viewing developments carefully , also reminded nearly all users, attempt to not visit unidentified web pages and do not receive an mysterious file, open , timely upgrades KV2005 Virus database , open real-time monitoring, to keep away from being a virus assault .