Microsoft Warns on New Windows Exploit

Microsoft on Thursday confirmed that it's investigating reports of a new attack exploit that targets one or more vulnerabilities in its Windows Animated Cursor handling implementation.

The vulnerabilities stem from the fact that Windows doesn't properly validate animated cursors prior to rendering them, Microsoft confirms. As a result, officials acknowledge, an attacker could craft a seemingly innocuous animated cursor and embed a malicious payload.

While the attack vector itself might be new, the means of exposure certainly isn't. "In order for this attack to be carried out, a user must either visit a [malicious] Web site...view a specially crafted e-mail message, or opening a specially crafted e-mail attachment sent to them by an attacker," wrote researcher Adrian Stone on the MSRC blog.

In the worst-case scenario, Microsoft researchers confirm, an attacker could take complete control of an affected system.

"[T]he attack appears to be targeted and not widespread [but] we are monitoring the issue and will new information becomes available," Stone wrote.

Microsoft has known about this vulnerability for several months now. "We have been working on this investigation since December to fully understand the issue and have been working to develop a comprehensive update as part of our standard MSRC process. Determina [an independent security researcher] has been and continues to work with us responsibly on this issue, and we thank them for helping us to protect customers," writes Microsot's Chris Budd on the MSRC blog.

According to Budd, the attacks themselves are a more recent phenomenon, Budd confirms. Security specialist McAfee first contacted Microsoft on Wednesday about a potential exploit, and -- 24 hours later, on Thursday -- Microsoft released Security Advisory 935423.

Past exploits -- such as any of several Word zero-day attacks that surfaced during both December and January -- haven't always been immediately patched.

This time around, Microsoft is at least considering an out-of-cycle update.

In the interim, Stone says, Microsoft has updated its Windows Live OneCare safety scanner to detect and remove malicious software that attempts to exploit this vulnerability.

Those using Internet Explorer 7 on Windows Vista are protected with Internet Explorer 7.0's protected mode.

About the Author

Stephen Swoyer is a Nashville, TN-based freelance journalist who writes about technology.


  • Microsoft Invests $1 Billion in Next-Level AI Research

    Research outfit OpenAI and Microsoft have inked a $1 billion deal around artificial general intelligence (AGI), considered the holy grail of AI research.

  • Microsoft Streamlining Office 365 App Activations

    The Office 365 app installation experience should get a little easier for end users starting as early as next month.

  • The 2019 Microsoft Product Roadmap

    From the next major update to Windows 10 to the next generation of HoloLens, here's what's on tap from Microsoft this year.

  • 2019 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss this year.