Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.801150 |
Categoría: | Denial of Service |
Título: | Yahoo! Messenger 'YahooBridgeLib.dll' ActiveX Control DOS Vulnerability |
Resumen: | This host is installed with Yahoo! Messenger and is prone to a Denial; of Service Vulnerability. |
Descripción: | Summary: This host is installed with Yahoo! Messenger and is prone to a Denial of Service Vulnerability. Vulnerability Insight: The flaw is due to a NULL pointer dereference error in 'RegisterMe()' method in 'YahooBridgeLib.dll', which can be exploited by causing the victim to visit a specially crafted web page. Vulnerability Impact: Successful exploitation will allow remote attackers to cause Denial of Service condition on the affected application. Affected Software/OS: Yahoo! Messenger version 9.x to 9.0.0.2162 on Windows. Solution: Upgrade to Yahoo! Messenger version 10.0.0.1270 or later CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
BugTraq ID: 37007 Common Vulnerability Exposure (CVE) ID: CVE-2009-4171 http://www.securityfocus.com/bid/37007 Bugtraq: 20091112 Yahoo Messenger 9 ActiveX DoS (Null Pointer) Vulnerability (Google Search) http://www.securityfocus.com/archive/1/507818/100/0/threaded XForce ISS Database: yahoo-messenger-activex-dos(54263) https://exchange.xforce.ibmcloud.com/vulnerabilities/54263 |
Copyright | Copyright (C) 2009 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |