,,`, W€(v)€ | €€| |أ ,`

Share and download latest booters , room tools , id creators, voice tools, chat clients & lot more exciting stuffs of Yahoo! You call also share your hacking tips out here & I'll add a Forum for ID trading soon.
 
HomeHome  PortalPortal  CalendarCalendar  FAQFAQ  SearchSearch  RegisterRegister  MemberlistMemberlist  UsergroupsUsergroups  Log in  

Share | 
 

 Yahoo Messenger zero-day exploits on the loose!

Go down 
AuthorMessage
Admin j3ff
Admin
Admin
avatar

Number of posts : 50
Registration date : 2007-06-06

PostSubject: Yahoo Messenger zero-day exploits on the loose!   Fri Jun 15, 2007 12:59 am

'Extremely critical' bugs let attackers snatch control of Windows PCs via IM!
Shortly after eEye Digital Security notified Yahoo Inc. yesterday that the portal's Messenger IM client was vulnerable to attack, a researcher fingered two ActiveX controls as flawed and posted exploit code that can be used to hijack Windows machines.

Although eEye's advisory was vague about details -- it said Messenger's Webcam ActiveX control was at fault -- the researcher laid all bare on the full-disclosure list.

The researcher, who went by the name "Danny," cited "45 minutes of fuzzing!" in a post yesterday about the flaw. In a follow-up today, Danny published a second exploit. "This affects the viewer ywcvwr.dll with yahoo messenger," he said.

Aliso Viejo, Calif.-based eEye called the Yahoo Messenger bugs serious. "ActiveX remote code execution vulnerabilities have very high impacts since the source of the malicious payload can be any site," the security vendor said. "An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with administrator credentials."

Most Windows XP users run in administrator mode.

Danish vulnerability tracker Secunia ApS rated the Messenger bugs as "extremely critical" -- its highest-possible threat ranking.

Until Yahoo provides a patch, eEye said the only work-around defense is to set the kill-bit for the two Yahoo ActiveX controls. However, because that involves manually editing the Windows registry, it's not a tactic most users will feel comfortable doing. Microsoft Corp., which in the past has recommended kill-bitting to temporarily protect users against vulnerabilities in Internet Explorer and its other software, has offered a set of technical instructions on setting kill bits.

Yahoo has not yet posted a fix for the flaws to its security update page. The last Messenger bug, also because of a vulnerable ActiveX control, was fixed in April.

Saturday, June 09, 2007
Back to top Go down
View user profile http://spacetools.realbb.net
 
Yahoo Messenger zero-day exploits on the loose!
Back to top 
Page 1 of 1
 Similar topics
-
» 1926768080@qq.com aka blackberryawardpomo-sa@yahoo.co.za
» How to open a mail from the yahoo mail inbox using selenium IDE
» Best Softswitch (VPS2.745 and 2.998 for only $200 Complete M
» Need a custom html page?
» How to read mails in inbox using Selenium IDE?

Permissions in this forum:You cannot reply to topics in this forum
,,`, W€(v)€ | €€| |أ ,` :: Latest NeWs :: latest yahoo news-
Jump to: