CVE-2007-5017

Summary

CVECVE-2007-5017
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2007-09-20 21:17:00 UTC
Updated2017-09-29 01:29:00 UTC
DescriptionAbsolute path traversal vulnerability in a certain ActiveX control in the CYFT object in ft60.dll in Yahoo! Messenger 8.1.0.421 allows remote attackers to force a download, and create or overwrite arbitrary files via a full pathname in the second argument to the GetFile method.

Risk And Classification

Problem Types: CWE-22

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Yahoo Messenger 8.1.0.421 All All All
Application Yahoo Messenger 8.1.0.421 All All All

References

ReferenceSourceLinkTags
Yahoo! Messenger CYFT FT60.DLL ActiveX Control GetFile Method Arbitrary File Upload Vulnerability BID www.securityfocus.com Exploit
shinnai.altervista.org MISC www.shinnai.altervista.org
Yahoo Messenger GetFile() Method Lets Remote Users Download Arbitrary Files to the Target User's System - SecurityTracker SECTRACK www.securitytracker.com
Yahoo! Messenger 8.1.0.421 CYFT Object Arbitrary File Download EXPLOIT-DB www.exploit-db.com
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
38296 OSVDB osvdb.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report