W32/ANI07.A!exploit

description-logoAnalysis

  • This exploit is employed to gain access to a system through known vulnerabilities. Files containing the ANI exploit code targetting the Windows Animated Cursor Handling Vulnerability are detected as W32/ANI07.A!exploit.
  • More information about this exploit can be found at http://www.microsoft.com/technet/security/Bulletin/MS07-017.mspx.

  • recommended-action-logoRecommended Action

      FortiGate Systems
    • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
      FortiClient Systems
    • Quarantine/delete files that are detected and replace infected files with clean backup copies.
      Patch
    • Download and install the patch for the Windows Animated Cursor Handling Vulnerability at http://www.microsoft.com/technet/security/Bulletin/MS07-017.mspx.

    Telemetry logoTelemetry

    Detection Availability

    FortiClient
    Extreme
    FortiMail
    Extreme
    FortiSandbox
    Extreme
    FortiWeb
    Extreme
    Web Application Firewall
    Extreme
    FortiIsolator
    Extreme
    FortiDeceptor
    Extreme
    FortiEDR