CVE-2004-0043
CVSS7.5
发布时间 :2004-02-03 00:00:00
修订时间 :2016-10-17 22:40:08
NMCOS    

[原文]Buffer overflow in Yahoo Instant Messenger 5.6.0.1351 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long filename in the download feature.


[CNNVD]Yahoo Instant Messenger超长文件名下载缓冲区溢出漏洞(CNNVD-200402-018)

        
        Yahoo Instant Messenger是一款流行的即时聊天工具。
        Yahoo Instant Messenger不正确处理特殊构建的超长文件名,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以进程权限在系统上执行任意指令。
        攻击者可以构建一个文件名超长的文件,然后发送给YIM用户,并要求用户下载,会导致YIM出现缓冲区溢出,精心构建文件名数据,可能以进程权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0043
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0043
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200402-018
(官方数据源) CNNVD

- 其它链接及资源

http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015334.html
(UNKNOWN)  FULLDISC  20040108 Yahoo Instant Messenger Long Filename Downloading Buffer Overflow
http://marc.info/?l=bugtraq&m=107357996802255&w=2
(UNKNOWN)  BUGTRAQ  20040108 Yahoo Instant Messenger Long Filename Downloading Buffer Overflow
http://www.securityfocus.com/bid/9383
(UNKNOWN)  BID  9383
http://www.securitytracker.com/id?1008651
(UNKNOWN)  SECTRACK  1008651
http://xforce.iss.net/xforce/xfdb/14171
(UNKNOWN)  XF  yahoo-messenger-filename-bo(14171)

- 漏洞信息

Yahoo Instant Messenger超长文件名下载缓冲区溢出漏洞
高危 边界条件错误
2004-02-03 00:00:00 2005-10-20 00:00:00
远程  
        
        Yahoo Instant Messenger是一款流行的即时聊天工具。
        Yahoo Instant Messenger不正确处理特殊构建的超长文件名,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以进程权限在系统上执行任意指令。
        攻击者可以构建一个文件名超长的文件,然后发送给YIM用户,并要求用户下载,会导致YIM出现缓冲区溢出,精心构建文件名数据,可能以进程权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Yahoo!
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载5.6.0.1355及以上版本:
        
        http://messenger.yahoo.com/

- 漏洞信息

3437
Yahoo! Messenger Download Feature Long Filename Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

A remote overflow exists in Yahoo! Messenger. The Yahoo! Messenger fails to validate the length of a filename when downloading resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of arbitrary code resulting in a loss of integrity.

- 时间线

2004-01-08 2004-01-08
Unknow Unknow

- 解决方案

Upgrade to version 5.6.0.1358 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Yahoo! Messenger File Transfer Buffer Overrun Variant Vulnerability
Boundary Condition Error 9383
Yes No
2004-01-08 12:00:00 2009-07-12 12:56:00
Discovery credited to Tri Huynh.

- 受影响的程序版本

Yahoo! Messenger 5.6 .0.1355
Yahoo! Messenger 5.6 .0.1351
Yahoo! Messenger 5.6 .0.1347
Yahoo! Messenger 5.6
Yahoo! Messenger 5.6 .0.1358
Yahoo! Messenger 5.6 .0.1356
Yahoo! Messenger 5.6 .0.1355

- 不受影响的程序版本

Yahoo! Messenger 5.6 .0.1358
Yahoo! Messenger 5.6 .0.1356
Yahoo! Messenger 5.6 .0.1355

- 漏洞讨论

Yahoo! Messenger is vulnerable to a remotely exploitable buffer overrun issue. This vulnerability is due to insufficient bounds checking during user-initiated file transfer requests. A file with a name of excessive length may cause this issue.

- 漏洞利用

The following proof-of-concept has been made available:

"test<insert around 210 spaces here>.jpg

- 解决方案

Vendor reports relayed through a third party indicate that versions later than 5.6.0 Build 1355 and later are not affected by this issue. The vendor has not directly confirmed this with Symantec.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站