First published: Fri Dec 15 2006(Updated: )
Buffer overflow in the YMMAPI.YMailAttach ActiveX control (ymmapi.dll) before 2005.1.1.4 in Yahoo! Messenger allows remote attackers to execute arbitrary code via a crafted HTML document. NOTE: some details were obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yahoo Messenger | =5.6 | |
Yahoo Messenger | =7.0 | |
Yahoo Messenger | =7.5 | |
Yahoo Messenger | =5.5 | |
Yahoo Messenger | <=8.0 | |
Yahoo Messenger | =5.0 | |
Yahoo Messenger | =6.0 | |
<=8.0 | ||
=5.0 | ||
=5.5 | ||
=5.6 | ||
=6.0 | ||
=7.0 | ||
=7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6603 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2006-6603, users should upgrade to the latest version of Yahoo Messenger that addresses this vulnerability.
CVE-2006-6603 affects several versions of Yahoo Messenger including 5.0, 5.5, 5.6, 6.0, 7.0, 7.5 and versions up to 8.0.
In CVE-2006-6603, a buffer overflow occurs when the YMMAPI.YMailAttach ActiveX control does not properly handle input, allowing attackers to execute arbitrary code.
Yes, CVE-2006-6603 can be exploited through a crafted HTML document that targets the vulnerable ActiveX control in Yahoo Messenger.