Site icon Liquidmatrix Security Digest

Yahoo! Messenger Two ActiveX Controls Buffer Overflows

Heads up Yahoo Messenger users. Here is a rare 5/5 alert from Secunia.

Description:
Danny has discovered two vulnerabilities in Yahoo! Messenger, which can be exploited by malicious people to compromise a user’s system.

1) A boundary error within the Yahoo! Webcam Upload (ywcupl.dll) ActiveX control can be exploited to cause a stack-based buffer overflow by assigning an overly long string to the “Server” property and then calling the “Send()” method.

2) A boundary error within the Yahoo! Webcam Viewer (ywcvwr.dll) ActiveX control can be exploited to cause a stack-based buffer overflow by assigning an overly long string to the “Server” property and then calling the “Receive()” method.

Successful exploitation of the vulnerabilities allows execution of arbitrary code.

The vulnerabilities are confirmed in version 8.1.0.249. Other versions may also be affected.

Solution:
Set the kill-bit for the affected ActiveX controls.

Article Link

[tags]Yahoo Messenger Exploit, Yahoo Messenger Vulnerability[/tags]

Exit mobile version