Serious flaws put Yahoo Messenger users in peril

News

Serious flaws put Yahoo Messenger users in peril

SearchSecurity.com Staff

Attackers could exploit two serious flaws in Yahoo Messenger to run malicious code on targeted machines, multiple security firms have warned.

eEye Digital Security said in an advisory that "multiple flaws exist within Yahoo Messenger which allow for remote execution of arbitrary code with minimal user interaction."

Yahoo Messenger flaws:
April: Yahoo fixes Messenger flaw: Attackers could exploit a flaw in Yahoo Messenger to hijack targeted machines, but a fix is available.

Companies take IM threats seriously: Wesabe is a brand new money management community, whose members share tips on everything from saving on organic produce to knocking down credit card debts. It is also among the companies saying it now takes threats to IM as seriously. 

Danish vulnerability clearinghouse Secunia took the description a few steps further in its advisory, saying the problems are a boundary error within the Yahoo Webcam Upload (ywcupl.dll) ActiveX control attackers could exploit to cause a stack-based buffer overflow by assigning an overly long string to the "server" property and then calling the "send()" method; and a boundary error within the Yahoo Webcam Viewer (ywcvwr.dll) ActiveX control attackers could exploit to cause a stack-based buffer overflow by assigning an overly long string to the "server" property and then calling the "receive()" method.

The flaws affect version 8.1.0.249, Secunia said. The firm recommended users mitigate the risk by setting the kill bit for the affected ActiveX controls.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
 

COMMENTS powered by Disqus  //  Commenting policy