diff options
author | luxagraf <sng@luxagraf.net> | 2019-05-04 15:48:55 -0500 |
---|---|---|
committer | luxagraf <sng@luxagraf.net> | 2019-05-04 15:48:55 -0500 |
commit | 79fafe2f44f5e31522dd93013950474342bfdfb0 (patch) | |
tree | bc9ccf5b4eadeebf3a2f86b21f9b382edfa41735 /old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt | |
parent | 62167091560c908db0613bcb35ff9ae8292f5961 (diff) |
archived all the stuff from freelancing for wired
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt')
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt b/old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt new file mode 100644 index 0000000..0e30027 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt @@ -0,0 +1,10 @@ +A quick note for fans of Yahoo Messenger: the company has released an update which [patches a vulnerability][1] in Yahoo's webcam video chat feature. This is the second time Yahoo has updated Messenger in recent months. + +The exploit, which was revealed last week and already exists in the wild, triggers a heap overflow if you accepts a webcam invitation from a malicious party. + +Once initiated the remote attacker could execute malicious code your machine. + +If you use Yahoo Messenger and haven't [downloaded the latest version][2], we recommend doing so, though we can't help wondering just who exactly accepts an unsolicited video chat request in the first place? + +[1]: http://messenger.yahoo.com/security_update.php?id=082107 +[2]: http://messenger.yahoo.com/download.php
\ No newline at end of file |