| We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| MSN Vulnerability; eep! | |
|---|---|
| Tweet Topic Started: Feb 13 2005, 04:54 PM (464 Views) | |
| AndrewF31 | Feb 13 2005, 04:54 PM Post #1 |
![]()
Otorrinolaringologista
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
MSN Logged on For Attacks Techtree News Staff Publishing date: 2005-02-11 18:15:33 Core Security Technologies, has published a vulnerability in Microsoft's MSN Messenger, an instant messaging program currently used by over 130 million people worldwide. A patch for this had been issued on Tuesday. Core Security Technologies, has published a vulnerability in Microsoft's MSN Messenger, an instant messaging program currently used by over 130 million people worldwide. A patch for this had been issued on Tuesday. Core Security is a Boston, U.S.-based information security solutions company. Core researchers discovered that by selecting a specially-crafted graphic as the user's display picture in MSN Messenger, an attacker could trigger a buffer overflow vulnerability on the chat partner's computer and covertly take over machines running instant messaging software. The attack would travel through the established chat session and would pass unnoticed by firewalls, network intrusion detection systems and even host-based personal firewalls and antivirus software. According to the vendor, Windows Messenger and Windows Media Player are also affected by this vulnerability. "This is a critical security flaw since it directly affects more than 130 million users and because the attack is very likely to go unnoticed by the several layers of security countermeasures commonly used today, said Ivan Arce, CTO at Core Security Technologies. "Since initially reporting the flaw, we have been working closely with the vendor and we are pleased to see that a fix is now available." The MSN Messenger protocol allows for the transmission of images between users during electronic conversations. The image format used to transfer those images is called Proprietary Network Graphics (PNG). When a user selects a picture to be displayed, Messenger converts it to the PNG format, with a fixed size and encoding characteristics. These images are then transmitted over the same communication channel used to exchange text messages. By sending a specially crafted PNG image, an attacker can trigger a buffer overflow and execute arbitrary code on the chat partner's machine. Systems running vulnerable MSN Messenger clients on Windows XP with Service Pack 2 installed are also exploitable. The vulnerability is exploitable in MSN Messenger client software up to version 6 including binary files compiled with the Visual Studio GS stack overflow protection mechanism. MSN Messenger 7 (beta) clients are not vulnerable. Exploitation of the vulnerability can be carried out though the same communications channel used by legitimate users for normal chat sessions, therefore it is very difficult to differentiate attacks from normal traffic. Article available at- http://www.techtree.com/techtree/jsp/shows...p?storyid=57598 Easier to read now I think. |
![]() |
|
| James | Feb 13 2005, 04:57 PM Post #2 |
|
Live to Dream
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Didn't this get patched a few nights back? I've been running 7 for a while now so no exploit here Can't wait for next month's new beta though.Edit: Not sure if it says it in that external link, but if you're intent on using (cruddy) Windows Messenger, you'll need to manually update to 5.2... |
![]() |
|
| AndrewF31 | Feb 13 2005, 04:58 PM Post #3 |
![]()
Otorrinolaringologista
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
ya, the article said tuesday last week the patch was released. |
![]() |
|
| Matthew | Feb 13 2005, 05:20 PM Post #4 |
|
Member
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Perhaps the Trillian coders didn't leave a buffer overflow vunerability in there? In other words: I think i'm safe because I use Trillian. Hopefully. But I used MSN Messenger 7 BETA anyway before, so i'm alright either way
|
![]() |
|
| Zach | Feb 13 2005, 06:16 PM Post #5 |
|
Missjayness
![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Yup, what he said. ![]() I stopped using the MSN program a month or so ago. Haven't looked back. |
![]() |
|
| Dynasty | Feb 13 2005, 06:16 PM Post #6 |
![]()
Senior Member
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Hardly use it
|
![]() |
|
| Rory | Feb 13 2005, 08:20 PM Post #7 |
|
i;m a mess
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
meh, auto-patch goodness. msn still working like a charm
|
![]() |
|
| primexx | Feb 13 2005, 08:31 PM Post #8 |
|
Primexx - A Member Of InvisionFree
![]() ![]() ![]() ![]() ![]() ![]()
|
yay go msn messenger 7!
|
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · Community Chat · Next Topic » |
| Track Topic · E-mail Topic |
12:45 PM Jul 13
|




![]](http://b1.ifrm.com/0/1/0/p601690/pipright.png)



Can't wait for next month's new beta though.


12:45 PM Jul 13