27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Version prior to and including 4.3.2229 contain<br />

buffer overflows in the code that processes AIM URLs. URLs containing "aim://" along<br />

with exceptionally long goim and screenname parameter strings may crash a remote AIM<br />

client provided the victim clicks on the link. A victim does NOT have to be running AIM<br />

for a remote attacker to exploit this vulnerability.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2000-1093<br />

AOL Instant Messenger Filename Handling Format String<br />

<strong>PVS</strong> ID: 1254 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to format string flaw\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Version 4.1.2010 of AIM is vulnerable to a format<br />

string attack that may exploited by an attacker to crash a victim's IM client, leading to a<br />

denial of service. The vulnerability lies in AIM's improper handling of file transfers of<br />

filenames containing "%s".<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2000-1000<br />

AOL Instant Messenger File Transfer Path Disclosure<br />

<strong>PVS</strong> ID: 1255 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client may reveal file path information\n\nThe remote host is<br />

running AOL Instant Messenger (AIM). Version 4.0 of AIM reveals the full pathname of<br />

transferred files. This information could be used to leverage further attacks against the<br />

client's machine.<br />

Solution: Upgrade to the latest version of AOL Instant Messenger.<br />

CVE-2000-0383<br />

AOL Instant Messenger Malformed ASCII Value Message DoS<br />

<strong>PVS</strong> ID: 1256 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a denial of service (DoS) attack\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions prior to and including 3.5<br />

of AIM do not properly handle coded ASCII symbols (&#XXX format) where XXX is a<br />

number greater than 255. AIM may crash if such a symbol is encountered resulting in a<br />

denial of service attack.<br />

Family Internet Services 320

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!