View Full Version : Yahoo! Messenger exploits seen in the wild

2007-06-10, 11:44

- http://isc.sans.org/diary.html?storyid=2952
Last Updated: 2007-06-10 01:42:13 UTC ~ "Just three days after the PoCs for 2 Yahoo! Messenger vulnerabilities have been posted ( http://isc.sans.org/diary.html?storyid=2943 ), we’ve been informed by Roger C. from the Malware-Test Lab about a site hosting exploits for the mentioned vulnerabilities. The exploit is referenced the standard way – an iframe points to the web site hosting the exploit (n.88tw.net). The exploit has been pretty simply obfuscated. One thing that makes it easier to identify is the object creation – for some reason attackers left it outside of the obfuscated string so it is very easy to spot:

<object classid="clsid:DCE2F8B1-A520-11D4-8FD0-00D0B7730277" id='viewme'></object>

Practically the only difference from the published PoC is the objects name – in this case it is, as you can see above, “viewme”, while the object name in the originally published PoC was “target”. The rest is very much the same, apart from the attached shellcode. The shellcode in the sample we analyzed downloaded another dropper (of course), and this second component wasn’t detected by any AV vendor on the VirusTotal site when we tested it (!!). This dropper downloaded further components, of which one was called 5in1.exe – we haven’t analyzed this yet but judging just by the file name, it doesn’t sound good.
As you are probably aware, Yahoo! provided a fix practically only couple of hours after the PoCs have been posted online (kudos to Yahoo! for this). If you are using Yahoo! Messenger you should upgrade as soon as possible..."

Yahoo! Messenger - (w/o the Yahoo toolbar)
- http://www.majorgeeks.com/Yahoo_Messenger_d4235.html
(click on "Free Downloads From: "Author's Site")
Date: 2007-06-08 / ymsgr810_401_us.exe

> http://www.us-cert.gov/current/#publicly_available_exploit_for_yahoo
updated June 8, 2007