27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

AOL Instant Messenger Active File Transfer Hijacking<br />

<strong>PVS</strong> ID: 1250 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client passes network data in an insecure manner\n\nThe remote<br />

host is running AOL Instant Messenger (AIM). In certain versions of AIM it is possible for<br />

a remote attacker to intercept data sent by the AIM client.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-0592<br />

AOL Instant Messenger IMG Tag Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1251 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client might allow an attacker to execute arbitrary<br />

commands\n\nThe remote host is running AOL Instant Messenger (AIM). In<br />

versions of AIM prior to and including 4.7 a remote attacker can create arbitrary<br />

files on the client's machine by sending a specially crafted message during a<br />

direct connection between the client and the attacker. In addition to being able to<br />

overwrite important files or create arbitrary files on the users system, this<br />

vulnerability may allow the attacker to execute arbitrary commands.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2002-0591<br />

AOL Instant Messenger Multiple DoS<br />

<strong>PVS</strong> ID: 1252 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to several denial of service attacks\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions prior to and including 4.7<br />

of AIM contain multiple buffer overflows that may be exploited when AIM tries to process<br />

exceptionally long comment strings in chat invite messages, long filenames (game names,<br />

buddy list names...), large amounts of font types in a message, or large Buddy Icons.<br />

Exploitation of these vulnerabilities can lock up or crash a victim's AIM client leading to a<br />

denial of service attack.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger<br />

CVE-2001-1421<br />

AOL Instant Messenger <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1253 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 319

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!