Vulnerability Name: | CCN-28232 | ||||||
Published: | 2006-08-04 | ||||||
Updated: | 2006-08-04 | ||||||
Summary: | Yahoo! Messenger could allow a remote attacker to spoof file extensions. If the "Hide extension for known file types" is enabled, a remote attacker could send a malicious file containing repeating € characters appended with a different file extension to hide the original extension of the file. An attacker could exploit this vulnerability to execute arbitrary code on a victim’s system by sending a malicious executable file that appears to be safe for opening. | ||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 4.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Fri Aug 04 2006 - 01:34:22 CDT Yahoo messenger file extension spoof vulnerability Source: CCN Type: Yahoo! Messenger Web site Yahoo! Messenger with Voice - Chat, Call, Share Photos, and More Source: CCN Type: BID-19353 Yahoo! Messenger File Extension Spoofing Vulnerability Source: XF Type: UNKNOWN yahoo-messenger-extension-spoofing(28232) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |