mailing list archives
AIM 4.8.2790 remote file execution vulnerability
From: "Blud Clot" <bludclot () hellokitty com>
Date: Mon, 21 Oct 2002 17:10:52 -0500
Description: AOL Instant Messenger version 4.8.2790 will execute
programs when a user clicks on a not-so-specially crafted hypertext
Versions affected: AOL Instant Messenger 4.8.2790. 4.7.2480 is not
vulnerable and neither is 5.0.2938. This bug was confirmed on both
Windows 2000 and Windows ME. It is suspected that any version of
windows would be vulnerable.
AOL Contacted: July 25, 2002. Never sent a response.
Details: When a malicious user sends a link pointing to an executable
file and a victim clicks on said link, the file will be executed
without any warning prompts. The url simply points to the filename.
However, certain characters are not allowed including spaces. Thus
the attacker is limited to running files on the same partition as the
current directory and/or system folders. Since an attacker doesn't
know the current directory they are likely to begin the url with a
few "../../../../" to get to the root of the partition.
Spaces cannot be entered, however this can be gotten around by using
dos files names: i.e. "program files" becomes
"progra~1". Here are a few examples:
<a href = "notepad.exe">hi</a>
<a href =
<a href =
All of these examples would run the program specified if the victim
were to click on them.
Solution: Upgrade or downgrade to any version of AIM other than
4.8.2790. Always check hyperlink urls before clicking on them.
Personal Note: This is such a stupid vulnerability and AOL are a
bunch of asshol~1 for not even responding after months.
Get your own Hello Kitty email @ www.sanriotown.com
Powered by Outblaze
- AIM 4.8.2790 remote file execution vulnerability Blud Clot (Oct 22)