ICQ < 6 Build 6059 Message Processing Format String

high Nessus Plugin ID 34948

Synopsis

The remote host contains a chat client that is affected by a remote format string vulnerability.

Description

The version of ICQ installed on the remote host is earlier than 6 Build 6059. Such versions reportedly are affected by a format string vulnerability in the embedded Internet Explorer component triggered when processing HTML messages with a format string specifier such as '%020000000p'. If a remote attacker can trick a user on the remote host into viewing a message with the affecting application, he may be able to leverage this issue to crash the affected application or to execute arbitrary code on the remote host subject to the user's privileges.

Solution

Upgrade to ICQ 6 build 6059 (6.0.0.6059) or later as that reportedly addresses the issue.

See Also

http://keksa.de/?q=icqstory

https://raidrush.net/threads/icq6-user-crashen-format-string-vulnerability.386983/

http://www.nessus.org/u?5251565e

Plugin Details

Severity: High

ID: 34948

File Name: icq_6_0_0_6059.nasl

Version: 1.10

Type: local

Agent: windows

Family: Windows

Published: 11/24/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/ICQ/Version

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-1120

BID: 28027

CWE: 134

Secunia: 29138