Yahoo patches Messenger zero-day flaws
But infrequent IM users could still be at risk
Computerworld - Yahoo Inc. late yesterday released a new version of its Messenger instant messaging client to patch a pair of zero-day vulnerabilities that let attackers grab control of a Windows PC with little or no help from the user.
The bugs in Messenger's Webcam ActiveX controls were reported Wednesday by eEye Digital Security Inc.; within hours a researcher identified only as "Danny" had posted exploit code for both flaws on a security mailing list.
A day later, Yahoo had patched Messenger, posted the new version on its site and urged everyone to download and install it. The update isn't mandatory, however. "Over the next several weeks, users worldwide will be prompted to update to a new version of Messenger upon signing into the service," a company spokesman said in an e-mail. "If you choose not to update, the vulnerability will still exist."
Nor is the update automatic, which means that users with older versions of Yahoo Messenger installed, but who no longer use the IM client, may never receive the warning. Infrequent users of Messenger will also be at risk until they update Yahoo's software.
A Yahoo security advisory also said that attacks would most likely come via malicious Web sites. "Some impacts of [the vulnerabilities] might include the introduction of executable code, being involuntarily logged out of a chat and/or instant messaging session, and the crash of an application such as Internet Explorer."
Because Yahoo had posted the patched edition, eEye updated its advisory today with additional information on the vulnerabilities and how they could be exploited by attackers. Normally, said eEye, the two buggy ActiveX controls are used only when viewing or streaming webcam video content to and from Messenger.
"But they are incorrectly marked safe for scripting and [so] can be instantiated by any Web site," eEye's new advisory read. That means an attacker with a malicious site can entice users there, then call on the flawed ActiveX controls without firing up Messenger and triggering the update alert. Also today, Danny the researcher updated his exploit code after others said they were unable to duplicate the vulnerabilities. Those testers have reported that the exploit updates work.
According to eEye, all versions of Windows are vulnerable to attack, except for Vista, since Yahoo has not yet finished a version for that operating system.
The updated Messenger for Windows 98, 2000, Millennium and XP is available for download.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts