what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

yahooactive.txt

yahooactive.txt
Posted Sep 18, 2003
Authored by Cesar Cerrudo

Yahoo! Webcam ActiveX controls are remotely susceptible to both a heap and stack based overflow vulnerability.

tags | advisory, overflow, activex
SHA-256 | 77415dcf52c38a6a335911442a1fbde9f49c7a2c7184a6d87d15d4affb71051a

yahooactive.txt

Change Mirror Download

Security Advisory

Name: Yahoo! Webcam ActiveX control buffer overflow.
Systems Affected : Yahoo! Messenger, Yahoo! Chat
Severity : High
Remote exploitable : Yes
Author: Cesar Cerrudo (Cleaning Internet of
dangerous ActiveX :))
Date: 09/16/03
Advisory Number: CC090307


Legal Notice:

This Advisory is Copyright (c) 2003 Cesar Cerrudo.
You may distribute it unmodified and for free. You may
NOT modify it and distribute it or
distribute parts of it without the author's written
permission. You may NOT use it for commercial
intentions (this means include it in vulnerabilities
databases, vulnerabilities scanners, any paid
service, etc.) without the author's written
permission. You are free to use Yahoo! advisory
details
for commercial intentions.


Disclaimer:

The information in this advisory is believed to be
true though it may be false.
The opinions expressed in this advisory are my own and
not of any company. The usual standard disclaimer
applies, especially the fact that Cesar Cerrudo is not
liable for any damages caused by direct or
indirect use of the information or functionality
provided by this advisory. Cesar Cerrudo bears no
responsibility for content or misuse of this advisory
or any derivatives thereof.


Overview:

Yahoo! Webcam Viewer Wrapper is an ActiveX control
used by Webcam feature of Yahoo! Messenger and Yahoo!
Chat, also it can be installed from Internet as a
stand alone ActiveX control.
This ActiveX control has a stack and heap based
overflow vulnerability.


Details:

When a long value is set in Yahoo! Webcam Viewer
Wrapper ActiveX control's "TargetName" property
a stack and heap based buffer overflow occurs
depending on the length of the string.

To reproduce the overflow just cut-and-paste the
following:

------sample.htm-----------
<object id="yahoowebcam"
classid="CLSID:E504EE6E-47C6-11D5-B8AB-00D0B78F3D48" >
</object>
<script>
yahoowebcam.TargetName="longstringhere";
</script>
---------------------------


This ActiveX control is marked as safe, so the above
sample will run without being blocked in default
Internet Explorer security configuration.
This vulnerability can be exploited to run arbitrary
code.



Vendor Status :

Yahoo! was contacted on 07/11/03, we work together (I
worked more than Yahoo! :) trying to showing them
that there was a stack overflow too) and Yahoo!
released a fix.
Yahoo! fixed first the heap overflow without fixing
the stack overflow, Yahoo! was contacted again and
again and again and again and then Yahoo! fixed the
stack overflow. It seems that Yahoo! need some good
programmers and QA team :). Yahoo! didn't release a
public advisory :(, so there are many users that
don't know that they have a vulnerable ActiveX
control.


Workaround:

If you have installed the ActiveX from Internet as a
stand alone ActiveX control or you have used Yahoo!
Chat then:
-Go to: %SystemRoot%\Downloaded Program Files\
-Right Click on: Yahoo! Webcam Viewer Wrapper
-Left Click: Remove


Patch Available :

http://messenger.yahoo.com/messenger/security/
Yahoo! Messenger users will be prompted to update upon
sign-in (if you are lucky, i tried and i wasn't
prompted to update).


Especial thanks to Jimmers for his help in testing.


SQL SECURITY LIST!!!: For people interested in SQL
Server security, vulnerabilities, SQL injection, etc.
Join at:
[EMAIL PROTECTED]
http://groups.yahoo.com/group/sqlserversecurity/



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close