本次是修復之前被發現的緩衝區溢位弱點(Buffer overflow vulnerability)

避免駭客進行遠端攻擊如果,有用低人就快點修補吧。

 

Yahoo Patches IM Vulnerability 

By Brian Prince

April 5, 2007 

 Be the first to comment on this article

 

Yahoo has patched a buffer overflow vulnerability in its instant-messaging tool that would have enabled attackers to potentially execute code on a compromised machine.

 

ADVERTISEMENT The flaw exists in an ActiveX control that is part of the Yahoo Messenger audio conference control. If exploited, a buffer overflow could cause a user to be involuntarily logged out of a chat or instant messaging session, the crash of an application such as Internet Explorer or the execution of code.

 

Read more here about Yahoo readying its new messenger.

According to the company, an attacker would have to trick a user into viewing malicious HTML code in order for the attack to be successful.

 

Andrew Storms, director of security operations for San Francisco-based nCircle, said addressing the vulnerability could pose a problem in large corporate environments where Yahoo Messenger is widely used.

 

"Yahoo IM is heavily used in the corporate environment even if security policy doesn't officially permit it," he said. "[This vulnerability] leaves administrators with the choices to upgrade or set the kill-bit on the affected ActiveX control. Unfortunately, many corporations are unable to centrally manage upgrades [to] Windows Messenger, making this fix extremely time-intensive for IT teams. Many companies will be performing ad-hoc mitigation to get this cleaned up."

 

Yahoo advises anyone who has installed Yahoo Messenger before March 13 to install the update.

 

arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()