Jump to content
xisto Community
Sign in to follow this  
tansqrx

Yahoo! Protocol: Part 19 - Conclusion

Recommended Posts

Throughout this tutorial the main objectives has been covered. Part 12 describes the exact packet structure generated by the shared files boot. Part 15 shows that it is possible to write a booter from the ground up only using information gathered through a network sniffer. Parts 16-18 shows that a booter performs its work by creating a timing fault that in turn cases the stack to be corrupted and an access violation generated. Part 18 also explores why injection of arbitrary code is not possible using current booter technology. In my closing opinion, I believe that Yahoo! has dodged the bullet for this exploit. This particular exploit has been in existence since mid-2004, and even with auto updates, Yahoo! has failed to fix this problem. If the stack corruption had occurred in any other place it may have been possible to run arbitrary code and a much more serious situation would occur. Program bug removal has always been a large problem for coders, especially with such a large user base as Yahoo! Messenger. There are hundreds if not thousands of rogue users all working against Yahoo! Messenger and the YMSG protocol. The question is not if another booter will expose itself but when. When the next round of booters are released, will random luck cause the program to crash in the program execution path or will it open a new door to run injected code? Only time will tell.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.