CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.6 | $5k-$25k | 0.00 |
A vulnerability, which was classified as critical, was found in Yahoo! Messenger up to 5.6 (Messaging Software). Affected is an unknown code in the library ft.dll of the component File Transfer Handler. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Buffer overflow in Yahoo! Messenger 5.6 allows remote attackers to cause a denial of service (crash) via a file send request (sendfile) with a large number of "%" (percent) characters after the Yahoo ID.
The bug was discovered 10/26/2003. The weakness was shared 10/27/2003 by Pejman Davarzani with Hat-Squad Security Team (Website). The advisory is available at secunia.com. This vulnerability is traded as CVE-2003-1135 since 05/04/2005. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $5k-$25k at the moment (estimation calculated on 06/26/2019).
The vulnerability was handled as a non-public zero-day exploit for at least 1 days. During that time the estimated underground price was around $25k-$100k.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at messenger.yahoo.com.
Further details are available at securityfocus.com.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.6
VulDB Base Score: 5.6
VulDB Temp Score: 5.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: DisableStatus: 🔍
0-Day Time: 🔍
Patch: messenger.yahoo.com
Timeline
10/26/2003 🔍10/27/2003 🔍
10/27/2003 🔍
10/28/2003 🔍
10/29/2003 🔍
12/31/2003 🔍
05/04/2005 🔍
06/26/2019 🔍
Sources
Vendor: yahoo.comAdvisory: secunia.com⛔
Researcher: Pejman Davarzani
Organization: Hat-Squad Security Team
Status: Not defined
CVE: CVE-2003-1135 (🔍)
SecurityFocus: 8894 - Yahoo! Messenger File Transfer Buffer Overrun Vulnerability
Secunia: 10075 - Yahoo! Messenger File Transfer Denial of Service Vulnerability, Not Critical
OSVDB: 2720 - Yahoo! Messenger Crafted File Transfer Remote Overflow DoS
Misc.: 🔍
Entry
Created: 10/29/2003 14:53Updated: 06/26/2019 20:23
Changes: 10/29/2003 14:53 (73), 06/26/2019 20:23 (1)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.