![]() While having (at the time of its release) very poor compatibility with Yahoo! Messenger and other browser based instant messengers, it at least had reasonable compatibility with the Microsoft Internet Explorer web browser. If the user has blocked receiving messages from anonymous users not on their contact list (by placing "All Others" in their block list), the attacker's messenger account must be on the user's allow list to exploit the vulnerability.MSN Messenger (colloquialized as simply MSN), later re-branded as Windows Live Messenger was a cross-browser instant messaging client built by Microsoft for use on the Microsoft Messenger server. If exploited successfully, the attacker could view the contents of a file on the hard drive without the user's knowledge as long as the attacker knew the name of the file and only if the user had read access privileges. An attacker could exploit this by sending a specially crafted request to another user. ![]() The vulnerability exists because of the method used by MSN Messenger to handle a file request. MSN Messenger patches a security vulnerability first reported by qFox and Mephisto. ![]() Product name: Microsoft® Windows NT® Operating Systemįile description: Win32 Cabinet Self-ExtractorĬopyright: Copyright © Microsoft Corp.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |