Yahoo! Messenger < File Extension Spoofing

medium Nessus Network Monitor Plugin ID 3700
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host may be tricked into running an executable file.


The remote host is running a version of Yahoo! Messenger that is reported vulnerable to a remote file extension spoofing flaw. Specifically, if a user sends a malformed download query that includes many '[email protected]' sequences, the displayed name of the file will obfuscate the true file type. An attacker can use this flaw to trick users into downloading files that they believe are not malicious. Successful exploitation might lead to the attacker executing arbitrary executables on the target system.


Upgrade to a version higher than

See Also

Plugin Details

Severity: Medium

ID: 3700

Published: 8/7/2006

Updated: 3/6/2019

Dependencies: 1273, 1275

Risk Information


Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:*

Reference Information

BID: 19353