Yahoo! Messenger < 8.0.0.863 File Extension Spoofing

medium Nessus Network Monitor Plugin ID 3700

Synopsis

The remote host may be tricked into running an executable file.

Description

The remote host is running a version of Yahoo! Messenger that is reported vulnerable to a remote file extension spoofing flaw. Specifically, if a user sends a malformed download query that includes many '~@' sequences, the displayed name of the file will obfuscate the true file type. An attacker can use this flaw to trick users into downloading files that they believe are not malicious. Successful exploitation might lead to the attacker executing arbitrary executables on the target system.

Solution

Upgrade to a version higher than 8.0.0.863.

See Also

http://messenger.yahoo.com

Plugin Details

Severity: Medium

ID: 3700

Published: 8/7/2006

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:yahoo:messenger

Reference Information

BID: 19353