|Check Point Reference:||CPAI-2008-062|
|Date Published:||6 Oct 2007|
|Last Updated:||27 Sep 2011|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||Yahoo! Messenger is a popular advertisement-supported instant messaging client. A buffer overflow vulnerability exists in Yahoo! Messenger. The vulnerability is due to a boundary error within the Yahoo! Messenger YVerInfo.dll ActiveX control when handling certain methods. To trigger this issue, an attacker may create a malicious web page that will exploit this vulnerability. Successful exploitation may allow execution of arbitrary code on a vulnerable system.|
This protection will detect and block the vulnerable ActiveX Control.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Yahoo! Messenger ActiveX control YVerInfo.dll buffer overflow