27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-1953<br />

AOL Instant Messenger URL refresh Tag XSS<br />

<strong>PVS</strong> ID: 1247 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote AOL Client may be coerced into running arbitrary HTML<br />

code\n\nThe remote host is running AOL Instant Messenger (AIM). AIM is prone to an<br />

issue that may allow maliciously crafted HTML to perform unauthorized actions (such as<br />

adding entries to the buddy list) on behalf of the user of a vulnerable client. This condition<br />

is due to how the client handles aim: URIs. These actions will be taken without prompting<br />

or notifying the user. This issue was reported for versions of AIM running on Microsoft<br />

Windows and MacOS. The Linux version of this client is not affected.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-2169<br />

AOL Instant Messenger AddBuddy Link Long ScreenName Parameter Overflow DoS<br />

<strong>PVS</strong> ID: 1248 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). A possible buffer overflow vulnerability exists in<br />

AIM. The condition is related to processing of malformed aim:AddBuddy hyperlinks. If a<br />

victim clinks on an AddBuddy hyperlink consisting of many comma delimited screen<br />

names, a crash occurs.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger<br />

CVE-2002-0785<br />

AOL Instant Messenger AddExternalApp Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 1249 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). AIM is vulnerable to a buffer overflow when an<br />

AddExternalApp request is received with a TLV greater than 0x2711. This vulnerability<br />

could allow a remote user to execute arbitrary code with the privaleges of the user running<br />

the AIM client.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-0005<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 318

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!