Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:3085 |
| Message | EXPLOIT AIM goaway message buffer overflow attempt |
| Summary | This event is generated when an attempt is made to exploit a vulnerability associated with AOL Instant Messenger (AIM) goaway message. |
| Impact | Serious. Execution of arbitrary commands may be possible. |
| Detailed Information | AIM is instant messaging software supplied by AOL Time Warner. A malicious URL offered in an AIM message or web page that sends an AIM client an overly long AIM "Away" message can cause a buffer overflow on a vulnerable client. This can permit the execution of arbitrary code on the client host. |
| Affected Systems | AOL Instant Messenger 5.5, 5.5.3415 Beta, 5.5.3595 |
| Attack Scenarios | An attacker can send an overly long AIM "Away" message or a user could be enticed to view a site that embeds such a message. |
| Ease of Attack | Simple. |
| Corrective Action | Upgrade to the most current nonaffected version of the software. |
| Additional References | iDefense: http://www.idefense.com/application/poi/display?id=121&type=vulnerabilities |
| Rule References | bugtraq: 10889 cve: 2004-0636 |
--
DID:259010
--
http://www.aanval.com/