Yahoo! Messenger < 8.0.0.863 File Extension Spoofing

Medium Nessus Network Monitor Plugin ID 3700

Synopsis

The remote host may be tricked into running an executable file.

Description

The remote host is running a version of Yahoo! Messenger that is reported vulnerable to a remote file extension spoofing flaw. Specifically, if a user sends a malformed download query that includes many '[email protected]' sequences, the displayed name of the file will obfuscate the true file type. An attacker can use this flaw to trick users into downloading files that they believe are not malicious. Successful exploitation might lead to the attacker executing arbitrary executables on the target system.

Solution

Upgrade to a version higher than 8.0.0.863.

See Also

http://messenger.yahoo.com

Plugin Details

Severity: Medium

ID: 3700

Published: 2006/08/07

Modified: 2016/01/21

Dependencies: 1273, 1275

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSSv3

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:yahoo:messenger

Reference Information

BID: 19353