Yahoo! Messenger YVerInfo ActiveX Buffer Overflows

This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by
multiple buffer overflow vulnerabilities.

Description :

The remote host contains the 'YVerInfo' ActiveX control, distributed
as part of the Yahoo! services suite typically downloaded with the
installer for Yahoo! Messenger.

The version of this control installed on the remote host reportedly
contains buffer overflows involving its 'fvCom' and 'info' methods.
If an attacker can trick a user on the affected host into visiting a
specially crafted web page, this issue could be leveraged to execute
arbitrary code on the host subject to the user's privileges.

See also :

http://www.nessus.org/u?c68a95bc
http://www.securityfocus.com/archive/1/478167/30/0/threaded
http://www.nessus.org/u?9e0863e9

Solution :

Either disable the use of this ActiveX control from within Internet
Explorer by setting its kill bit or upgrade to Yahoo! Messenger
version 8.1.0.419 (version 2007.8.27.1 of the YVerInfo control itself)
or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 25955 ()

Bugtraq ID: 25494

CVE ID: CVE-2007-4515

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now