From Secunia:

Description:
A vulnerability has been reported in Yahoo! Messenger, which can be exploited by malicious people to compromise a user’s system.

The vulnerability is caused due to a boundary error within the AudioConf ActiveX control (yacscom.dll) component of Yahoo! Messenger. This can be exploited to cause a stack-based buffer overflow by setting the “socksHostname” and “hostName” properties to an overly large string and then calling the “createAndJoinConference()” method.

Successful exploitation allows execution of arbitrary code when a user visits a malicious web site.

The vulnerability is reported in version 8.x. Other versions may also be affected.

Article Link

[tags]Yahoo! Messenger, Buffer Overflow, Vulnerability[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.