Yahoo! Messenger < File Extension Spoofing

Medium Nessus Network Monitor Plugin ID 3700


The remote host may be tricked into running an executable file.


The remote host is running a version of Yahoo! Messenger that is reported vulnerable to a remote file extension spoofing flaw. Specifically, if a user sends a malformed download query that includes many '[email protected]' sequences, the displayed name of the file will obfuscate the true file type. An attacker can use this flaw to trick users into downloading files that they believe are not malicious. Successful exploitation might lead to the attacker executing arbitrary executables on the target system.


Upgrade to a version higher than

See Also

Plugin Details

Severity: Medium

ID: 3700

Published: 2006/08/07

Updated: 2019/03/06

Dependencies: 1273, 1275

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSS v3.0

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:yahoo:messenger

Reference Information

BID: 19353