Vigil@nce: Messenger, sensitive information recovery via ActiveX
August 2008 by Vigil@nce
An attacker can create a malicious webpage in order to recover information in order to usurp victim’s identity.
Consequences: privileged access/rights, data reading
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 13/08/2008
Microsoft Windows 2000 [confidential versions]
Microsoft Windows 2003 [confidential versions]
Microsoft Windows XP [confidential versions]
Microsoft Messenger can implement ActiveX controller.
A malicious webpage exploiting "Messenger.UIAutomation.1" ActiveX
can interact with the Messenger client to:
recover status of a user
obtain information on a contact
initiate audio and video sessions without user autorisation
usurp victim’s identity
An attacker can therefore recover information which can be used to usurp victim’s identity.
Identifiers: 955702, CVE-2008-0082, MS08-050, VIGILANCE-VUL-8024