Yahoo has closed off a zero day hole in its popular instant messenger program.
The hole allowed attackers to insert dubious links into status messages by simulating a file transfer.
BitDefender researcher Bogdan Botezatu found the hole that was caused by an $InlineAction parameter, which controls the accept transfer feature. The parameter could be manipulated to load an iFrame.
The attacker did not have to be in the victim's contact list to send the iFrame.
Yahoo had deployed a server-side fix for the latest version 11.x of its chat client
Bitdefender said it found the flaw while investigating a customer’s machine.
Copyright © SC Magazine, Australia
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.