Yahoo! Messenger文件传输缓冲区溢出漏洞

Yahoo! Messenger文件传输缓冲区溢出漏洞

漏洞ID 1107552 漏洞类型 缓冲区溢出
发布时间 2003-10-27 更新时间 2005-10-20
图片[1]-Yahoo! Messenger文件传输缓冲区溢出漏洞-安全小百科CVE编号 CVE-2003-1135
图片[2]-Yahoo! Messenger文件传输缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200312-393
漏洞平台 Windows CVSS评分 2.6
|漏洞来源
https://www.exploit-db.com/exploits/23293
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200312-393
|漏洞详情
Yahoo!Messenger5.6版本存在缓冲区溢出漏洞。远程攻击者可以借助在YahooID后添写超多”%”(百分号)的文件发送请求(sendfile)导致服务拒绝(崩溃)。
|漏洞EXP
source: Yahoo! Messenger File Transfer Buffer Overrun Vulnerability

Yahoo! Messenger is prone to a remotely exploitable buffer overrun vulnerability. An attacker may trigger this condition by initiating a malformed 'sendfile' request, which the victim user must then accept. This will reportedly result in an access violation error, which is likely due to memory corruption.

An attacker may theoretically exploit this condition to execute arbitrary code on a client system. This condition can be exploited via a malicious 'sendfile' link. 

YMSGR:sendfile?[victim_yahooID]+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%&c%c:[somefile]
|参考资料

来源:BID
名称:8894
链接:http://www.securityfocus.com/bid/8894
来源:BUGTRAQ
名称:20031026BufferOverflowinYahoomessengerClient
链接:http://www.securityfocus.com/archive/1/342472

相关推荐: Rlaj WhoIs Remote Shell Command Execution Vulnerability

Rlaj WhoIs Remote Shell Command Execution Vulnerability 漏洞ID 1101834 漏洞类型 Input Validation Error 发布时间 2002-06-27 更新时间 2002-06-27 C…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享