{"vuid":"VU#688094","idnumber":"688094","name":"Microsoft MSN Messenger fails to properly validate file requests","keywords":["Microsoft MSN Messenger","information disclosure","MS04-010"],"overview":"Microsoft MSN Messenger fails to properly validate file requests which could allow an attacker to view the contents of files on the victim's system.","clean_desc":"Microsoft MSN Messenger is an instant messaging application that allows users to collaborate with friends using text messages, voice and video communication, or by sending files. There is a vulnerability in the way MSN Messenger handles incoming file requests from other users. By sending a specially crafted file request, a remote, unauthenticated attacker could view the contents of files on the victim's system with the privileges of the vulnerable process. This would require that the attacker had knowledge of the location of the file on the victim's system.","impact":"A remote, unauthenticated user could view the contents of files on the victim's system with privileges of the vulnerable process.","resolution":"Apply Patch Microsoft has provided a patch to address this vulnerability. For a list of affected versions and details on obtaining the patch, please refer to Microsoft Security Bulletin MS04-010.","workarounds":"","sysaffected":"","thanks":"Microsoft credits qFox and Mephisto for reporting this vulnerability.","author":"This document was written by Damon Morda.","public":["http://www.microsoft.com/technet/security/bulletin/ms04-010.mspx","http://secunia.com/advisories/11078/","http://messenger.msn.com/"],"cveids":["CVE-2004-0122"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-09T19:21:14Z","publicdate":"2004-03-09T00:00:00Z","datefirstpublished":"2004-03-10T20:52:19Z","dateupdated":"2004-03-15T18:04:45Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"4.95","cam_scorecurrentwidelyknown":"6.075","cam_scorecurrentwidelyknownexploited":"10.575","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.95,"vulnote":null}