Lucene search

K
saintSAINT CorporationSAINT:8EAA23FC75E2D9528672990C6ADC7583
HistoryApr 12, 2007 - 12:00 a.m.

Yahoo Messenger AudioConf ActiveX control buffer overflow

2007-04-1200:00:00
SAINT Corporation
www.saintcorporation.com
16

EPSS

0.672

Percentile

98.0%

Added: 04/12/2007
CVE: CVE-2007-1680
BID: 23291
OSVDB: 34319

Background

Yahoo! Messenger is an instant messaging application. It includes the AudioConf ActiveX control which is provided by **yacscom.dll**.

Problem

A buffer overflow vulnerability in the AudioConf ActiveX control allows command execution when the **createAndJoinConference** method is called with a long **socksHostname** or **hostname** parameter.

Resolution

Download the latest version of Yahoo! Messenger.

References

<http://messenger.yahoo.com/security_update.php?id=031207&gt;
<http://www.zerodayinitiative.com/advisories/ZDI-07-012.html&gt;
<http://www.kb.cert.org/vuls/id/388377&gt;

Limitations

Exploit works with Yahoo! Messenger 8.1.0.195 and requires a user to load the exploit page.

Platforms

Windows

EPSS

0.672

Percentile

98.0%