Lucene search

K
kasperskyKaspersky LabKLA10664
HistorySep 11, 2015 - 12:00 a.m.

KLA10664 Code execution vulnerability in Yahoo! Messenger

2015-09-1100:00:00
Kaspersky Lab
threats.kaspersky.com
34

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

8

Confidence

High

EPSS

0.032

Percentile

91.2%

Buffer overflow vulnerability was found in Yahoo! Messenger. By exploiting this vulnerability malicious users can cause denial of service or execute arbitrary code. This vulnerability can be exploited remotely via a specially designed emoticons.xml file.

Technical details

Vulnerability caused by unrestricted emoticons parameters reading. This vulnerability can be exploited via changing content of emoticons.xml at title and shortcut elements. Changed emoticons file can be distributed via custom emoticons pack. At this moment vendor does not plan to release special patch for this vulnerability.

Original advisories

rcesecurity advlisory

PacketStorm advisory

Related products

Yahoo!-Messenger

CVE list

CVE-2014-7216 critical

Solution

Try to update version as soon as vendor release patch. Before update avoid installation of untrusted emoticons packs or other actions involves changes in emoticons.xml file.

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

Affected Products

  • Yahoo! Messenger 11.5.0.228 and earlier

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

8

Confidence

High

EPSS

0.032

Percentile

91.2%