{"vuid":"VU#172315","idnumber":"172315","name":"Yahoo! Messenger \"addview\" function allows for the automatic execution of malicious script contained in web pages","keywords":["Yahoo! Messenger","addview function","malicious script","JavaScript","content tab"],"overview":"Yahoo! Messenger is an instant messaging client. When installed, Yahoo! Messenger enables a URI handler (ymsgr :parameter). The addview function of this handler can be used to execute arbitrary script/html on the local system.","clean_desc":"The addview feature of Yahoo! Messenger is used to allow users to view content from a site that is formatted in the Yahoo! Messenger format without the need for a stand-alone web browser. If the attacker can trick the user into visiting a website or opening an HTML-renderable email, the attacker can exploit this vulnerability to execute arbitrary script/HTML on the local system with the privileges of the current user.","impact":"An attacker can send malicious script and HTML to the client using the Yahoo! URL redirection service. This script or HTML is interpreted by the Yahoo! Messenger client and is displayed in the client's web browser. The arbitrary script/HTML is executed on the local system in the Internet security zone.","resolution":"Upgrade to version 5,0,0,1066.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported on by Phuong Nguyen of Vice Consulting.","author":"This document was written by Jason Rafail.","public":["http://online.securityfocus.com/archive/1/274223","http://www.securityfocus.com/bid/4838"],"cveids":["CVE-2002-0032"],"certadvisory":"CA-2002-16","uscerttechnicalalert":null,"datecreated":"2002-05-28T16:48:38Z","publicdate":"2002-05-27T00:00:00Z","datefirstpublished":"2002-06-05T18:15:12Z","dateupdated":"2002-06-05T21:07:54Z","revision":23,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"23.73046875","cam_scorecurrentwidelyknown":"23.73046875","cam_scorecurrentwidelyknownexploited":"42.71484375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":23.73046875,"vulnote":null}