12 results (0.006 seconds)

CVSS: 9.3EPSS: 95%CPEs: 4EXPL: 4

Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions. Un desbordamiento de búfer en la región heap de la memoria en Microsoft MSN Messenger versiones 6.2, 7.0 y 7.5, y Live Messenger versión 8.0 permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de vectores no especificados que involucran el manejo de conversación de video en Web Cam y sesiones de video chat. • https://www.exploit-db.com/exploits/30537 https://www.exploit-db.com/exploits/4334 http://osvdb.org/40126 http://secunia.com/advisories/26570 http://www.kb.cert.org/vuls/id/166521 http://www.securityfocus.com/bid/25461 http://www.securitytracker.com/id?1018622 http://www.team509.com/modules.php?name=News&file=article&sid=50 http://www.us-cert.gov/cas/techalerts/TA07-254A.html http://www.vupen.com/english/advisories/2007/2987 https://docs.microsoft.com/en&# • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 0

Microsoft MSN Messenger 4.7 on Windows XP allows remote attackers to cause a denial of service (resource consumption) via a flood of SIP INVITE requests to the port specified for voice conversation. Microsoft MSN Messenger 4.7 en Windows XP permite a atacantes remotos provocar una denegación de servicio (consumo de recursos) mediante una inundación de peticiones SIP INVITE al puerto especificado para conversación por voz. • http://osvdb.org/45427 http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=292& https://exchange.xforce.ibmcloud.com/vulnerabilities/35064 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE. • http://www.msn-password-recovery.com http://www.securityfocus.com/archive/1/421921/100/0/threaded http://www.securityfocus.com/archive/1/422283/100/0/threaded •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 3

Microsoft MSN Messenger allows remote attackers to cause a denial of service via a plaintext message containing the ".pif" string, which is interpreted as a malicious file extension and causes users to be kicked from a group conversation. NOTE: it has been reported that Gaim is also affected, so this may be an issue in the protocol or MSN servers. • http://securitytracker.com/id?1014444 http://www.digitalparadox.org/viewadvisories.ah?view=45 http://www.messenger-blog.com/?p=146 •

CVSS: 7.5EPSS: 22%CPEs: 1EXPL: 0

GIF file validation error in MSN Messenger 6.2 allows remote attackers in a user's contact list to execute arbitrary code via a GIF image with an improper height and width. • http://secunia.com/advisories/14915 http://www.kb.cert.org/vuls/id/633446 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-022 https://exchange.xforce.ibmcloud.com/vulnerabilities/19950 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4927 •