mailing list archives
Aol Instant Messenger DoS vulnerability
From: justcruzn () HOTMAIL COM (hi im cruz)
Date: Fri, 3 Mar 2000 07:47:50 PST
As all Ascii-Symbols can be displayed in &#XXX; format, where XXX are
numbers from 0-255, AIM seems not to check the XXX for higher values
and some strings above 255 result in aim crashing completly or in part.
E.g. the string ̂ will result in crashing the whole aim, but ̃
will crash only the instant message window (̃ was only tested once
It will crash the AIM of the attacker too, because AIM displays the string
in the attacker-Instant Message, so the attacker-AIM also tries to convert
it and errors.
There is already an unofficial fix available, which can be downloaded at my
The fix is an edited ate32.dll, which should be copied to the aim directory.
With it, aim doesnt try to convert "&#XXX;"-type of strings anymore, a
minimum drawback (note: with that fix, the attacker can use this exploit to
crash other unfixed AIMs, but wont crash his/her own AIM).
Affected versions: I tested this only on 3.5+ versions of AIM, but all other
versions are most likely affected too.
Get Your Private, Free Email at http://www.hotmail.com
Aol Instant Messenger DoS vulnerability hi im cruz (Mar 03)
TrendMicro OfficeScan, numerous security holes, remote files modification. Captain'z root (Mar 03)
Re: [ Hackerslab bug_paper ] Linux dump buffer overflow Lamagra Argamal (Mar 03)