{"vuid":"VU#912659","idnumber":"912659","name":"AOL Instant Messenger vulnerable to denial-of-service attack via buddy list transfers","keywords":["AOL Instant Messenger","DoS","denial of service"],"overview":"America Online's Instant Messenger (AIM) contains a remotely exploitable buffer overflow vulnerability.","clean_desc":"AOL Instant Messenger is a program for communicating with other users over the Internet and is widely used. During a buddy list transfer, a buffer overflow may occur. It has not been determined if this transfer happens via peer-to-peer, peer-to-server-to-peer, or both types of connections.","impact":"A denial-of-service situation is caused. It has not been determined if this vulnerability can lead to the remote execution of code.","resolution":"Users can mitigate this vulnerability by upgrading AIM to version 4.8.2790 or higher. It is also reported that on March 14, 2002 AOL implemented server-side filtering to mitigate this vulnerability.","workarounds":"Block AIM Authentication at the Firewall Blocking connections to login.oscar.aol.com on port 5190/tcp may prevent users on the local network from authenticating to the AIM server. This may be sufficient to prevent the vulnerability from being exploited. Block Untrusted Messages AIM permits the user to only accept messages from known peers. By enabling this feature, you may be able to prevent the vulnerability from being exploited. Note that you may still be vulnerable to attacks that originate from known peers if the vulnerability is exploited in a worm-like fashion.","sysaffected":"","thanks":"Our thanks to AOL Time Warner for their help in analyzing this vulnerability.","author":"This document was written by Jason Rafail.","public":["h","t","t","p",":","/","/","o","n","l","i","n","e",".","s","e","c","u","r","i","t","y","f","o","c","u","s",".","c","o","m","/","a","r","c","h","i","v","e","/","1","/","2","5","9","2","6","5"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-03-07T14:44:54Z","publicdate":"2002-03-01T00:00:00Z","datefirstpublished":"2002-06-11T20:12:11Z","dateupdated":"2002-06-19T15:00:42Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"3","cam_easeofexploitation":"2","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.225","cam_scorecurrentwidelyknown":"0.28125","cam_scorecurrentwidelyknownexploited":"0.50625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.225,"vulnote":null}