Yahoo! Messenger < YVerInfo ActiveX Buffer Overflow

medium Nessus Network Monitor Plugin ID 4199
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.


The remote host contains the 'YVerInfo' ActiveX control, distributed as part of the Yahoo! services suite typically downloaded with the installer for Yahoo! Messenger. The version of this control installed on the remote host reportedly contains a boundary error. If an attacker can trick a user on the affected host into visiting a specially-crafted web page, he may be able to leverage this issue to execute arbitrary code on the host subject to the user's privileges.


Either disable the use of this ActiveX control from within Internet Explorer by setting its 'kill' bit or upgrade to Yahoo! Messenger version (version 2007.8.27.1 of the YVerInfo control itself) or higher.

See Also

Plugin Details

Severity: Medium

ID: 4199

Published: 8/30/2007

Updated: 3/6/2019

Dependencies: 1273, 1275

Nessus ID: 25955

Risk Information


Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Risk Factor: Medium

Base Score: 5

Temporal Score: 4.7

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:*

Exploitable With

Metasploit (Yahoo! Messenger YVerInfo.dll ActiveX Control Buffer Overflow)

Reference Information

CVE: CVE-2007-4515, CVE-2007-4635

BID: 25494, 25484