{"vuid":"VU#137115","idnumber":"137115","name":"Yahoo! Messenger contains a buffer overflow in the URI handler","keywords":["Yahoo","Messenger","buffer overflow","IMvironment field"],"overview":"Yahoo! Messenger is an instant messaging client. A remotely exploitable vulnerability has been reported in the URI handler of Yahoo! Messenger.","clean_desc":"A remotely exploitable buffer overflow exists in the URI handler of Yahoo! Messenger, versions 5,0,0,1064 and prior, that may permit a remote attacker to execute arbitrary code on the system with the privileges of the current user. A shared buffer for the parameter functions, such as \"getimv\", \"sendim\", \"message\", \"addview\", \"adduser\", \"call\", and \"chat\", is vulnerable to exploit. This URI handler is installed by Yahoo! Messenger for applications that use the underlying operating system (such as Microsoft Internet Explorer, Netscape Navigator, Outlook, or the command shell). A URI can be sent by another Yahoo! Messenger user, embedded in a web site, or sent in an HTML-renderable email message.","impact":"Exploitation of this vulnerability will crash the application, resulting in a denial-of-service condition. However, this vulnerability is a buffer overflow and may allow the execution of arbitrary code on the local system with the privileges of the current user.","resolution":"Upgrade to version 5,0,0,1066.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Phuong Nguyen <dphuong@yahoo.com> of Vice Consulting.","author":"This document was written by Jason Rafail.","public":["http://online.securityfocus.com/archive/1/274223","http://www.securityfocus.com/bid/4837"],"cveids":["CVE-2002-0031"],"certadvisory":"CA-2002-16","uscerttechnicalalert":null,"datecreated":"2002-05-31T22:00:31Z","publicdate":"2002-05-27T00:00:00Z","datefirstpublished":"2002-06-05T18:16:35Z","dateupdated":"2002-06-06T15:01:24Z","revision":32,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"18.984375","cam_scorecurrentwidelyknown":"23.73046875","cam_scorecurrentwidelyknownexploited":"42.71484375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.984375,"vulnote":null}