{"vuid":"VU#515968","idnumber":"515968","name":"Yahoo! Messenger webcam stream heap overflow","keywords":["Yahoo!","Messenger","heap overflow","arbitrary code execution","webcam invitations","Yahoo Messenger"],"overview":"Yahoo! Messenger fails to properly handle webcam streams, which may allow a remote attacker to execute arbitrary code.","clean_desc":"Yahoo! Messenger is an instant messaging application that is available for Windows, Mac, Unix, web, and mobile systems. Some version of Yahoo! Messenger, such as the Windows and Mac versions, support webcam use. When Yahoo! Messenger views a webcam stream, it makes a connection to port 5100/tcp. The webcam video stream is sent as a JPEG 2000 code stream. Yahoo! Messenger appears to require user interaction to connect a webcam stream. Yahoo! Messenger contains a heap overflow in the handling of a malformed JPEG 2000 code streams. Exploit code that causes a denial of service is publicly available.","impact":"A remote attacker may be able to execute arbitrary code with the privileges of the user running Yahoo! Messenger. This vulnerability may also cause a denial of service by causing Yahoo! Messenger to crash.","resolution":"Apply an update\nThis issue is addressed by the Yahoo! Webcam Security Update. Versions of Yahoo! Messenger downloaded after August 21, 2007 contain kdv_v32M.dll version 3.2.0.2 and ywcvwr.dll version 2.0.1.9, which address the vulnerability.","workarounds":"Restrict network access This vulnerability can be mitigated by blocking outgoing connections to 5100/tcp. This appears to prevent Yahoo! Messenger from connecting to a webcam stream. Do not accept webcam invitations Until this vulnerability has been addressed by the vendor, do not accept any Yahoo! Messenger webcam invitations, regardless of the source.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by team509.","author":"This document was written by Will Dormann.","public":["http://messenger.yahoo.com/security_update.php?id=082107","http://www.avertlabs.com/research/blog/index.php/2007/08/15/more-on-the-yahoo-messenger-webcam-0day/","http://www.pcworld.com/article/id,135988-c,instantmessaging/article.html","http://secunia.com/advisories/26501/","https://www.xfocus.net/bbs/index.php?act=ST&f=2&t=64639&page=1#entry321749","http://jvn.jp/cert/JVNVU%23515968/index.html"],"cveids":["CVE-2007-4391"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-08-16T13:46:45Z","publicdate":"2007-08-15T00:00:00Z","datefirstpublished":"2007-08-17T15:15:45Z","dateupdated":"2007-08-28T15:44:31Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"13","cam_impact":"6","cam_easeofexploitation":"13","cam_attackeraccessrequired":"15","cam_scorecurrent":"7.7000625","cam_scorecurrentwidelyknown":"7.7000625","cam_scorecurrentwidelyknownexploited":"13.4038125","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.7000625,"vulnote":null}