Yahoo! Widgets YDP YDPCTL.YDPControl.1 ActiveX (YDPCTL.dll) Buffer Overflow

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by a
buffer overflow vulnerability.

Description :

The remote host contains the YDP ActiveX control, distributed as a
part of Yahoo! Widgets.

The version of this control installed on the remote host reportedly
fails to validate input to the 'GetComponentVersion' method before
storing it in a 512-byte buffer. If an attacker can trick a user on
the affected host into visiting a specially crafted web page, he may
be able to leverage this issue to execute arbitrary code on the host
subject to the user's privileges.

See also :

http://help.yahoo.com/l/us/yahoo/widgets/security/security-08.html

Solution :

Either disable the use of this ActiveX control from within Internet
Explorer by setting its kill bit or upgrade to Yahoo! Widgets
version 4.0.5 (version 2007.7.13.3 of the YDP control itself) or
later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 25798 ()

Bugtraq ID: 25086

CVE ID: CVE-2007-4034

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now