Yahoo patches Messenger zero-day flaws
But infrequent IM users could still be at risk
Computerworld - Yahoo Inc. late yesterday released a new version of its Messenger instant messaging client to patch a pair of zero-day vulnerabilities that let attackers grab control of a Windows PC with little or no help from the user.
The bugs in Messenger's Webcam ActiveX controls were reported Wednesday by eEye Digital Security Inc.; within hours a researcher identified only as "Danny" had posted exploit code for both flaws on a security mailing list.
A day later, Yahoo had patched Messenger, posted the new version on its site and urged everyone to download and install it. The update isn't mandatory, however. "Over the next several weeks, users worldwide will be prompted to update to a new version of Messenger upon signing into the service," a company spokesman said in an e-mail. "If you choose not to update, the vulnerability will still exist."
Nor is the update automatic, which means that users with older versions of Yahoo Messenger installed, but who no longer use the IM client, may never receive the warning. Infrequent users of Messenger will also be at risk until they update Yahoo's software.
A Yahoo security advisory also said that attacks would most likely come via malicious Web sites. "Some impacts of [the vulnerabilities] might include the introduction of executable code, being involuntarily logged out of a chat and/or instant messaging session, and the crash of an application such as Internet Explorer."
Because Yahoo had posted the patched edition, eEye updated its advisory today with additional information on the vulnerabilities and how they could be exploited by attackers. Normally, said eEye, the two buggy ActiveX controls are used only when viewing or streaming webcam video content to and from Messenger.
"But they are incorrectly marked safe for scripting and [so] can be instantiated by any Web site," eEye's new advisory read. That means an attacker with a malicious site can entice users there, then call on the flawed ActiveX controls without firing up Messenger and triggering the update alert. Also today, Danny the researcher updated his exploit code after others said they were unable to duplicate the vulnerabilities. Those testers have reported that the exploit updates work.
According to eEye, all versions of Windows are vulnerable to attack, except for Vista, since Yahoo has not yet finished a version for that operating system.
The updated Messenger for Windows 98, 2000, Millennium and XP is available for download.
Read more about Security in Computerworld's Security Topic Center.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- The business impact of BYOA: Five major challenges and how your enterprise can solve them This E-Book reviews five major challenges of BYOA with key subject matter experts and outlines how businesses can solve them.
- BYOA: Embracing the Opportunity, Controlling the Risk This whitepaper explores the shift from BYOD to BYOA (bring-your-own-application) and how IT departments today can address this new change in the IT...
- Learn More About Peer 1 Hosting's Mission Critical Cloud Mission Critical Cloud from Peer 1 Hosting is enterprise-ready, creating a perfect point of adoption whether you need an off-premise solution for development
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade.
- Peer 1's Mission Critical Cloud: Your Cloud, Your Way Peer 1 Hosting's Mission Critical Cloud offers the ultimate in flexible customization of infrastructure, resources and support. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!