Yahoo! Messenger < YVerInfo ActiveX Buffer Overflow

Medium Nessus Network Monitor Plugin ID 4199


The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.


The remote host contains the 'YVerInfo' ActiveX control, distributed as part of the Yahoo! services suite typically downloaded with the installer for Yahoo! Messenger. The version of this control installed on the remote host reportedly contains a boundary error. If an attacker can trick a user on the affected host into visiting a specially-crafted web page, he may be able to leverage this issue to execute arbitrary code on the host subject to the user's privileges.


Either disable the use of this ActiveX control from within Internet Explorer by setting its 'kill' bit or upgrade to Yahoo! Messenger version (version 2007.8.27.1 of the YVerInfo control itself) or higher.

See Also

Plugin Details

Severity: Medium

ID: 4199

Published: 2007/08/30

Updated: 2019/03/06

Dependencies: 1273, 1275

Nessus ID: 25955

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.4

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 5

Temporal Score: 4.7

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:yahoo:messenger

Exploitable With

Metasploit (Yahoo! Messenger YVerInfo.dll ActiveX Control Buffer Overflow)

Reference Information

CVE: CVE-2007-4635, CVE-2007-4515

BID: 25494, 25484