December 23 , Jiangmin Anti-Virus Middle monitored the enterprise , Windows technique, three new vulnerabilities and also the technical details to be published around the internet. They are : LoadImage API heap overflow vulnerability , Winhlp32.exe heap overflow and crash the kernel file handling ANI cursor vulnerability.
Which , LoadImage heap overflow vulnerability inside the JPEG use and some time back a similar vulnerability , a consumer searching a Web page to exploit this vulnerability , which may perhaps be considered a virus or malware infection. Additionally to Windows XP SP2 , another pretty much all NT operating methods ( including Windows NT, Windows 2000 SP0 ~ SP4, Windows XP SP0 ~ SP1 and Windows 2003) are affected by this vulnerability .
Winhlp32.exe vulnerability affects Windows XP SP2 , including practically all Windows working techniques. Exploit this vulnerability , a hacker can create a unique Aid file (. hlp files) , triggering an overflow that might result in arbitrary code execution.
ANI vulnerability doesn't impact the processing core collapse of your Windows XP SP2 system, working with this vulnerability , a remote attacker can make the Internet web page, instantly attacked the system reboot or blue screen kernel deadlock .
Jiangmin anti-virus experts, this three -level vulnerabilities are a significant danger , Jiangmin providers are observing developments closely , also reminded nearly all users, try not to visit not known sites and don't receive an unfamiliar file, open , timely upgrades KV2005 Virus database ,
Office Professional Plus 2010, open real-time monitoring, to stay clear of becoming a virus attack .