YTK Pro Admin Begging to Patch Yahoo Exploit

Lol Venom one of admin of YTK Pro is crying to yahoo in order to patch the exploits found by dazza. Its really funny this guys are selling anti boot with tag line "100% Unbootable" for just $13.99 .
Another funny tag line Warning : May irritate Booters ... I think they are irritated more by latest yahoo exploits and they should be because they wana sell there unbootable garbage tool .

Here is Post which was posted by Venom in Yahoo messenger blog

Quote

Ehh, if I were you I’d make the new typing notification optional with the option to switch between them.

However, the following bugs have NOT been addressed…

Messenger Bugs:

-The size of the text input area in instant messages isn’t saved.
-Sometimes the instant message window size isn’t saved.
-There is no way to turn off the Messenger tips (in the IM windows) in Messenger, other than a registry key from the v8.1.0.421 build.
-Cannot perform : chat emotes in chats anymore.
-Version registry key under HKCU\Software\yahoo\pager is still stuck as 0.0.0.0.
-Messenger locks up for no reason at times, especially with a captcha visible on screen. Could be possibly due to a bug in yui.dll.

I’d recommend going back to the old system put in place with Messenger v8.1 and before regarding the instant message window size, placement and text input area size.

Now, there’s some server-side problems and exploits you guys should be aware of.

Server-side Issues & Exploits:

-Webcam servers are unstable and sometimes unusable.
-Donkey Punch chat room voice chat exploit.
-0×1C additional conference invite packet exploit which can be used to fill the disconnection buffer queue (the ‘buffer boot’) to disconnect ANY users.
-0×1C additional conference invite packets can be sent over 9K in size due to a bug in service 81 (it can only be sent from the SP1 and AC4 servers) which can disconnect ANY users.
-Users are able to launch denial-of-service attacks on the RTP servers of an individual chat room, which causes ALL users to lose voice chat due to the RTP servers having low bandwidth.

I recommend removing the disconnection rule (buffer) from the servers again like back in May 2008, which essentially ’solved’ the buffer boot exploit going around. I’d also recommend moving all the RTP servers to something that can handle DoS attacks on it.

Comment by Venom — January 12, 2009 #

http://www.ymessengerblog.com/blog/2009/01/12/updated-version-of-90-now-available/

Dont Buy YTK Pro if you are getting free better alternate Ymhook




No comments: