Yahoo! Messenger is an instant messaging client. When installed, Yahoo! Messenger enables a URI handler (ymsgr :parameter). The addview function of this handler can be used to execute arbitrary script/html on the local system.
The addview feature of Yahoo! Messenger is used to allow users to view content from a site that is formatted in the Yahoo! Messenger format without the need for a stand-alone web browser. If the attacker can trick the user into visiting a website or opening an HTML-renderable email, the attacker can exploit this vulnerability to execute arbitrary script/HTML on the local system with the privileges of the current user.
An attacker can send malicious script and HTML to the client using the Yahoo! URL redirection service. This script or HTML is interpreted by the Yahoo! Messenger client and is displayed in the client’s web browser. The arbitrary script/HTML is executed on the local system in the Internet security zone.
Upgrade to version 5,0,0,1066.
172315
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: May 29, 2002 Updated: June 05, 2002
Affected
Yahoo! encourages users to upgrade to the latest version whenever prompted by the AutoUpdater or regularly check for updated versions of the client at <http://messenger.yahoo.com>.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23172315 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported on by Phuong Nguyen of Vice Consulting.
This document was written by Jason Rafail.
CVE IDs: | CVE-2002-0032 |
---|---|
CERT Advisory: | CA-2002-16 Severity Metric: |