CVE-2007-3928
 
Severity Score
7.6
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Buffer overflow in Yahoo! Messenger 8.1 allows user-assisted remote authenticated users to execute arbitrary code via a long e-mail address in an address book entry. NOTE: this might overlap CVE-2007-3638.
Desbordamiento de búfer en Yahoo! Messenger 8.1 permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante una dirección larga de correo electrónico en una entrada de la libreta de direcciones.
NOTA: Esto podría solaparse con CVE-2007-3638.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-07-20 CVE Reserved
- 2007-07-21 CVE Published
- 2024-05-24 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064669.html | Mailing List | |
http://securityreason.com/securityalert/2906 | Third Party Advisory | |
http://www.securityfocus.com/bid/24926 | Vdb Entry | |
http://www.securitytracker.com/id?1018398 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35434 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/26066 | 2017-07-29 | |
http://www.xdisclose.com/advisory/XD100002.html | 2017-07-29 |
URL | Date | SRC |
---|