Format string vulnerability in the ext_yahoo_contact_added function in yahoo.c in Miranda IM 0.7.1 allows remote attackers to execute arbitrary code via a Y7 Buddy Authorization packet with format string specifiers in the contact Yahoo! handle (who).
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/3823 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38362 | vdb entry |
http://secunia.com/advisories/27402 | third party advisory patch vendor advisory |
http://www.securityfocus.com/bid/26389 | vdb entry |
http://secunia.com/secunia_research/2007-89/advisory/ | |
http://miranda.svn.sourceforge.net/viewvc/miranda/trunk/miranda/protocols/Yahoo/yahoo.c?r1=6601&r2=6699&diff_format=l |