°º¤ø,¸¸,ø¤º°`°º¤ø,¸ W€£ÇØ(v)€ ¯|¯Ø §þåç€Ñ€¯|¯ ¯|¯ØØ£§ ¸,ø¤º°`°º
Would you like to react to this message? Create an account in a few clicks or log in to continue.
°º¤ø,¸¸,ø¤º°`°º¤ø,¸ W€£ÇØ(v)€ ¯|¯Ø §þåç€Ñ€¯|¯ ¯|¯ØØ£§ ¸,ø¤º°`°º

Share and download latest booters , room tools , id creators, voice tools, chat clients & lot more exciting stuffs of Yahoo! You call also share your hacking tips out here & I'll add a Forum for ID trading soon.
 
HomeHome  PortalPortal  SearchSearch  Latest imagesLatest images  RegisterRegister  Log in  

 

 Yahoo Messenger zero-day exploits on the loose!

Go down 
AuthorMessage
Admin j3ff
Admin
Admin
Admin j3ff


Number of posts : 50
Registration date : 2007-06-06

Yahoo Messenger zero-day exploits on the loose! Empty
PostSubject: Yahoo Messenger zero-day exploits on the loose!   Yahoo Messenger zero-day exploits on the loose! Icon_minitimeFri Jun 15, 2007 12:59 am

'Extremely critical' bugs let attackers snatch control of Windows PCs via IM!
Shortly after eEye Digital Security notified Yahoo Inc. yesterday that the portal's Messenger IM client was vulnerable to attack, a researcher fingered two ActiveX controls as flawed and posted exploit code that can be used to hijack Windows machines.

Although eEye's advisory was vague about details -- it said Messenger's Webcam ActiveX control was at fault -- the researcher laid all bare on the full-disclosure list.

The researcher, who went by the name "Danny," cited "45 minutes of fuzzing!" in a post yesterday about the flaw. In a follow-up today, Danny published a second exploit. "This affects the viewer ywcvwr.dll with yahoo messenger," he said.

Aliso Viejo, Calif.-based eEye called the Yahoo Messenger bugs serious. "ActiveX remote code execution vulnerabilities have very high impacts since the source of the malicious payload can be any site," the security vendor said. "An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with administrator credentials."

Most Windows XP users run in administrator mode.

Danish vulnerability tracker Secunia ApS rated the Messenger bugs as "extremely critical" -- its highest-possible threat ranking.

Until Yahoo provides a patch, eEye said the only work-around defense is to set the kill-bit for the two Yahoo ActiveX controls. However, because that involves manually editing the Windows registry, it's not a tactic most users will feel comfortable doing. Microsoft Corp., which in the past has recommended kill-bitting to temporarily protect users against vulnerabilities in Internet Explorer and its other software, has offered a set of technical instructions on setting kill bits.

Yahoo has not yet posted a fix for the flaws to its security update page. The last Messenger bug, also because of a vulnerable ActiveX control, was fixed in April.

Saturday, June 09, 2007
Back to top Go down
https://spacetools.forumotion.com
 
Yahoo Messenger zero-day exploits on the loose!
Back to top 
Page 1 of 1
 Similar topics
-
» Voice Chat in Yahoo Messenger On Windows Vista
» Yahoo admininstration booter
» Bite Me Yahoo Lagger V.2
» Yahoo BOts ID PAssword changer
» Fake Yahoo Login Page

Permissions in this forum:You cannot reply to topics in this forum
°º¤ø,¸¸,ø¤º°`°º¤ø,¸ W€£ÇØ(v)€ ¯|¯Ø §þåç€Ñ€¯|¯ ¯|¯ØØ£§ ¸,ø¤º°`°º :: Latest NeWs :: latest yahoo news-
Jump to: