ICQ < 6 Build 6059 Message Processing Format String

High Nessus Plugin ID 34948


The remote host contains a chat client that is affected by a remote format string vulnerability.


The version of ICQ installed on the remote host is earlier than 6 Build 6059. Such versions reportedly are affected by a format string vulnerability in the embedded Internet Explorer component triggered when processing HTML messages with a format string specifier such as '%020000000p'. If a remote attacker can trick a user on the remote host into viewing a message with the affecting application, he may be able to leverage this issue to crash the affected application or to execute arbitrary code on the remote host subject to the user's privileges.


Upgrade to ICQ 6 build 6059 ( or later as that reportedly addresses the issue.

See Also




Plugin Details

Severity: High

ID: 34948

File Name: icq_6_0_0_6059.nasl

Version: $Revision: 1.7 $

Type: local

Agent: windows

Family: Windows

Published: 2008/11/24

Modified: 2016/05/16

Dependencies: 11425

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/ICQ/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-1120

BID: 28027

OSVDB: 42889

Secunia: 29138

CWE: 134