Yahoo Messenger generates a DoS vulnerability

Picture 1 of Yahoo Messenger generates a DoS vulnerability Secunia has quoted an independent security researcher as saying that Yahoo Messenger (YM) instant messaging has generated a new vulnerability that could potentially allow hackers to launch translation denial attacks. Service (DoS) on victim computer.

The above flaw arises from a mistake in the process of processing certain messages. This weakness can be exploited to hang Yahoo! The user's client messenger via a fake message contains "non ascii" characters (non-ascii) specially designed.

Example message format: s: [space] msg [alt + 0160]: -------------------------------- ------------- iframe onload = $ InlineAction ()> :)

Successful exploits that require users who have not configured YM to ignore "dangerous" contact objects are not included in the Messenger list.

Secunia said, the newly identified vulnerability exists in YM version 7.5.0.814. Other versions may also be affected. Currently Yahoo has not had any comment on this vulnerability.

Solution: Configure Yahoo! Messenger ignores users who are not in the Messenger list.