What causes this threat?
The threat is caused by insufficient format validation
prior to rendering cursors, animated cursors, and icons.
What might an attacker use this function to do?
An attacker could try to exploit the vulnerability by creating a specially crafted web page.
An attacker could also create a specially-crafted email message and send it to an affected system. Upon viewing a web page, previewing or reading a specially crafted message, or opening a specially crafted email attachment the attacker could cause the affected system to execute code. While animated cursors typically are associated with the .ani file extension, a successful attack is not constrained by this file type
Dus het tijdelijk uitschakelen van .ani bestanden vormt geen garantie.
(o.a. @de Rochebrune)
Read e-mail messages in plain text format
Bron: (Overigens dezelfde bron als die van jou, de Rochebrune)
Meer specifieke informatie
Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service
(persistent reboot) via a malformed ANI file, which results in memory corruption
when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7.
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allows remote attackers to execute arbitrary code via the AnimationHeaderBlock length field, which leads to a stack-based buffer overflow.