27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nThe remote host is running a version of Yahoo Instant Messenger that reveals<br />

whether a user is on-line or not regardless of whether the user is marked as being<br />

"invisible". This information can be determined by trying to access the user's shared files: a<br />

different error message is reported if the user is on-line than if the user is off-line.<br />

Solution: Upgrade to the latest version of Yahoo! Messenger.<br />

CVE Not available<br />

Yahoo! Messenger ymsgr Protocol Multiple Function Overflow<br />

<strong>PVS</strong> ID: 1261 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running a version of Yahoo Instant Messenger that is vulnerable to multiple buffer<br />

overflows in the code that processes URLs of the type "ymsgr:". By supplying a specially<br />

crafted URL a remote attacker can exploit this vulnerability to execute arbitrary code on the<br />

client's machine.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

CVE-2002-0031<br />

Yahoo! Messenger ymsgr URI Arbitrary Script Execution<br />

<strong>PVS</strong> ID: 1262 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection flaw\n\nThe remote host is<br />

running a version of Yahoo Instant Messenger that is vulnerable to a script injection attack.<br />

It is possible to create a URL that contains the ymsgr:addview? function and which points<br />

to a webpage containing malicious code. This code will be automatically loaded and<br />

rendered by the Yahoo Client allowing for the execution of attacker supplied code that will<br />

run with the privileges of the IM client user.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

CVE-2002-0032<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Yahoo! Messenger ymsgr URI Arbitrary Script Execution<br />

<strong>PVS</strong> ID: 1263 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner\n\nThe remote host is running a version of Yahoo Instant Messenger that does not<br />

encrypt user passwords when authenticating a user during login. Anyone monitoring the<br />

local segment can thus extract the passwords of the user running the client.<br />

Solution: Upgrade to the latest version of Yahoo Instant Messenger.<br />

Family Internet Services 322

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!