Yahoo! Messenger AudioConf ActiveX Control (yacscom.dll) Multiple Property Overflow

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host has an ActiveX control that is affected by a
buffer vulnerability.

Description :

The remote host contains a version of the 'AudioConf' ActiveX control
included with Yahoo! Messenger.

The version of this ActiveX control on the remote host has a buffer
overflow triggered by calling the control's 'createAndJoinConference'
method with large values for the 'socksHostname' and 'hostname'
properties. If an attacker can trick a user on the affected host into
visiting a specially crafted web page, this issue could be leveraged
to execute arbitrary code on the host subject to the user's

See also :

Solution :

Update to the latest version of Yahoo! Messenger and ensure that the
version of the control is at least or higher.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 24913 ()

Bugtraq ID: 23291

CVE ID: CVE-2007-1680

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now