Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:3666
HistoryOct 23, 2002 - 12:00 a.m.

AIM 4.8.2790 remote file execution vulnerability

2002-10-2300:00:00
vulners.com
67

Description: AOL Instant Messenger version 4.8.2790 will execute
programs when a user clicks on a not-so-specially crafted hypertext
link.

Versions affected: AOL Instant Messenger 4.8.2790. 4.7.2480 is not
vulnerable and neither is 5.0.2938. This bug was confirmed on both
Windows 2000 and Windows ME. It is suspected that any version of
windows would be vulnerable.

AOL Contacted: July 25, 2002. Never sent a response.

Details: When a malicious user sends a link pointing to an executable
file and a victim clicks on said link, the file will be executed
without any warning prompts. The url simply points to the filename.
However, certain characters are not allowed including spaces. Thus
the attacker is limited to running files on the same partition as the
current directory and/or system folders. Since an attacker doesn't
know the current directory they are likely to begin the url with a
few "…/…/…/…/" to get to the root of the partition.
Spaces cannot be entered, however this can be gotten around by using
dos files names: i.e. "program files" becomes
"progra~1". Here are a few examples:

<a href = "notepad.exe">hi</a>
<a href =
"…/…/…/…/progra~1/trojan/trojan.exe">www.google.com</a>

<a href =
"…/…/…/…/you/get/the/point/exampl~1.exe">blah</a>

All of these examples would run the program specified if the victim
were to click on them.

Solution: Upgrade or downgrade to any version of AIM other than
4.8.2790. Always check hyperlink urls before clicking on them.

Personal Note: This is such a stupid vulnerability and AOL are a
bunch of asshol~1 for not even responding after months.

-BludClot


Get your own Hello Kitty email @ www.sanriotown.com

Powered by Outblaze