Yahoo! Messenger < 8.1.0.419 YVerInfo ActiveX Buffer Overflow

medium Nessus Network Monitor Plugin ID 4199

Synopsis

The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.

Description

The remote host contains the 'YVerInfo' ActiveX control, distributed as part of the Yahoo! services suite typically downloaded with the installer for Yahoo! Messenger. The version of this control installed on the remote host reportedly contains a boundary error. If an attacker can trick a user on the affected host into visiting a specially-crafted web page, he may be able to leverage this issue to execute arbitrary code on the host subject to the user's privileges.

Solution

Either disable the use of this ActiveX control from within Internet Explorer by setting its 'kill' bit or upgrade to Yahoo! Messenger version 8.1.0.419 (version 2007.8.27.1 of the YVerInfo control itself) or higher.

See Also

http://messenger.yahoo.com/security_update.php?id=082907

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=591

http://www.securityfocus.com/archive/1/478167/30/0/threaded

Plugin Details

Severity: Medium

ID: 4199

Published: 8/30/2007

Updated: 3/6/2019

Nessus ID: 25955

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.7

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:yahoo:messenger

Exploitable With

Metasploit (Yahoo! Messenger YVerInfo.dll ActiveX Control Buffer Overflow)

Reference Information

CVE: CVE-2007-4515, CVE-2007-4635

BID: 25494, 25484