HTTP: Windows Live Messenger Unsafe ActiveX Method (MSKB 240797)

This signature detects attempts to use unsafe ActiveX controls in Windows Live Messenger. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

Windows Live Messenger is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Successful exploits allow remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. Windows Live Messenger 2009 on Windows Vista and 7 is vulnerable; other versions may also be affected. NOTE: The BID is being retired. The issue is not exploitable because the control is not safe for scripting.

Affected Products

Microsoft windows_live_messenger_2009

Short Name
HTTP:STC:ACTIVEX:LIVE-PROFILE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
(MSKB 240797) ActiveX Live Messenger Method Unsafe Windows bid:37680
Release Date
01/12/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Microsoft

Found a potential security threat?