Executive Summary
Summary | |
---|---|
Title | Yahoo! Webcam view utilities ActiveX control vulnerable to arbitrary code execution |
Informations | |||
---|---|---|---|
Name | VU#932217 | First vendor Publication | 2007-06-08 |
Vendor | VU-CERT | Last vendor Modification | 2007-06-11 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#932217Yahoo! Webcam view utilities ActiveX control vulnerable to arbitrary code executionOverviewThe Yahoo! Webcam view utilities ActiveX control contains a stack buffer overflow, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.I. DescriptionYahoo! Webcam is a component of Yahoo! Messenger that allows users to chat via webcams over a network. Yahoo! Webcam Viewer includes an ActiveX control provided by the file ywcvwr.dll . This ActiveX control contains a stack buffer overflow vulnerability in the Server property.We are aware of publicly available exploit code for this vulnerability. This issue is addressed in Yahoo! Messenger 8.1. If you are unable to upgrade, please consider the following workarounds:
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerActiveX Compatibility{9D39223E-AE8E-11D4-8FD3-00D0B7730277}] "Compatibility Flags"=dword:00000400 Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this and other ActiveX vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document. Systems Affected
References
This issue was reported by eEye Digital Security in EEYEZD-20070606. This document was written by Chris Taschner.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/932217 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 6 |
SAINT Exploits
Description | Link |
---|---|
Yahoo Messenger Webcam Viewer ActiveX control buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
37081 | Yahoo! Webcam Viewer ActiveX (ywcvwr.dll) receive Method Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Yahoo Webcam Viewer Wrapper ActiveX function call unicode access RuleID : 11821 - Revision : 5 - Type : WEB-ACTIVEX |
2014-01-10 | Yahoo Webcam Viewer Wrapper ActiveX function call access RuleID : 11820 - Revision : 8 - Type : BROWSER-PLUGINS |
2014-01-10 | Yahoo Webcam Viewer Wrapper ActiveX clsid unicode access RuleID : 11819 - Revision : 5 - Type : WEB-ACTIVEX |
2014-01-10 | Yahoo Webcam Viewer Wrapper ActiveX clsid access RuleID : 11818 - Revision : 9 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-06-11 | Name : The remote Windows host has a least one ActiveX control that is affected by a... File : yahoo_msgr_webcam_activex_buffer_overflows.nasl - Type : ACT_GATHER_INFO |