Vulnerabilities > CVE-2012-0268 - Numeric Errors vulnerability in Yahoo Messenger
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Integer overflow in the CYImage::LoadJPG method in YImage.dll in Yahoo! Messenger before 11.5.0.155, when photo sharing is enabled, might allow remote attackers to execute arbitrary code via a crafted JPG image that triggers a heap-based buffer overflow.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | YAHOO_MSGR_11_5_0_155.NASL |
description | The version of Yahoo! Messenger installed on the remote host is earlier than 11.5.0.155 and is reportedly affected by an integer overflow. The error exists in the method |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 58000 |
published | 2012-02-17 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/58000 |
title | Yahoo! Messenger < 11.5.0.155 CYImage::LoadJPG Method JPG File Handling Remote Integer Overflow |
code |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 51405 CVE ID: CVE-2012-0268 Yahoo! Messenger是一款流行的即时通信软件。 Yahoo! Messenger在实现上存在安全漏洞,可被恶意用户利用控制用户系统。 此漏洞源于在分配使用图形尺寸值的内存时,"CYImage::LoadJPG()"方法(YImage.dll)中存在整数溢出漏洞,可通过特制的JPG文件造成堆缓冲区溢出。 0 Yahoo! Messenger 11.x 厂商补丁: Yahoo! ------ 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://messenger.yahoo.com/ |
id | SSV:30023 |
last seen | 2017-11-19 |
modified | 2012-01-17 |
published | 2012-01-17 |
reporter | Root |
title | Yahoo Messenger ".jpg"文件处理缓冲区溢出漏洞 |