summaryrefslogtreecommitdiff
path: root/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt
diff options
context:
space:
mode:
Diffstat (limited to 'published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt')
-rw-r--r--published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt10
1 files changed, 10 insertions, 0 deletions
diff --git a/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt b/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt
new file mode 100644
index 0000000..0e30027
--- /dev/null
+++ b/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt
@@ -0,0 +1,10 @@
+A quick note for fans of Yahoo Messenger: the company has released an update which [patches a vulnerability][1] in Yahoo's webcam video chat feature. This is the second time Yahoo has updated Messenger in recent months.
+
+The exploit, which was revealed last week and already exists in the wild, triggers a heap overflow if you accepts a webcam invitation from a malicious party.
+
+Once initiated the remote attacker could execute malicious code your machine.
+
+If you use Yahoo Messenger and haven't [downloaded the latest version][2], we recommend doing so, though we can't help wondering just who exactly accepts an unsolicited video chat request in the first place?
+
+[1]: http://messenger.yahoo.com/security_update.php?id=082107
+[2]: http://messenger.yahoo.com/download.php \ No newline at end of file