Yahoo! Messenger AudioConf ActiveX Control (yacscom.dll) Multiple Property Overflow

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by a
buffer vulnerability.

Description :

The remote host contains a version of the 'AudioConf' ActiveX control
included with Yahoo! Messenger.

The version of this ActiveX control on the remote host has a buffer
overflow triggered by calling the control's 'createAndJoinConference'
method with large values for the 'socksHostname' and 'hostname'
properties. If an attacker can trick a user on the affected host into
visiting a specially crafted web page, this issue could be leveraged
to execute arbitrary code on the host subject to the user's
privileges.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-07-012.html
http://www.securityfocus.com/archive/1/464607/30/0/threaded
http://www.nessus.org/u?96afd17a

Solution :

Update to the latest version of Yahoo! Messenger and ensure that the
version of the control is at least 1.0.0.48 or higher.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 24913 ()

Bugtraq ID: 23291

CVE ID: CVE-2007-1680

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now