Two 'extremely critical' vulnerabilities have been discovered in Yahoo Messenger that could be exploited by malicious users to compromise a system.
The boundary errors have been confirmed in version 184.108.40.206 of the messaging software, but other versions may also be affected.
Both flaws are based around the Yahoo Webcam facilities within the software. The problems occur in the 'ywcupl.dll' file that deals with the Webcam Upload, and the 'ywcvwr.dll' file which handles the Webcam Viewer.
Both ActiveX controls can be exploited to cause a stack-based buffer overflow by assigning an overly long string to the Server property and then using the 'Send()' or 'Receive()' actions.
A successful execution of the exploits could allow arbitrary code to be run on the affected machine.
Security firm Secunia rated the flaws at its highest 'extremely critical' level, and said that the problems can be blocked by changing the kill-bit settings for the affected ActiveX controls.
Secunia advisory 25547: Yahoo Messenger Two ActiveX Controls Buffer Overflows
Credit card thieves used Apple ID accounts to buy and sell virtual currency for Clash of Clans and Clash Royale and Marvel Contest of Champions
$5.1bn fine further evidence that the EU is anti-US, claims Trump
New cable will connect Virginia to France
Loon's balloons will bring the internet to remote areas of the country