AOL Instant Messenger "goim" handler screenname buffer overflow could crash the client
|aim-goim-screenname-bo (9950)||Low Risk|
AOL Instant Messenger (AIM) is vulnerable to a denial of service attack, caused by a heap buffer overflow in the "goim" handler. If a remote attacker using a specially-crafted screenname sends a message to a victim, the attacker could overflow a buffer and cause the victim's AIM client to crash when the victim chooses the "Get Info" option for the malicious screenname.
Denial of Service
No remedy available as of May 1, 2013.
- BugTraq Mailing List, Fri Aug 23 2002 - 19:35:57 CDT : AOL Instant Messenger Heap Overflow .
- BID-5492: AOL Instant Messenger Link Special Character Remote Heap Overflow Vulnerability
- CVE-2002-1953: Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects Get Info on the buddy.
- OSVDB ID: 59896: AOL Instant Messenger (AIM) goim Handler Screen Name Parameter Handling Overflow
- AOL AOL Instant Messenger 4.4
- AOL AOL Instant Messenger 4.5
- AOL AOL Instant Messenger 4.6
- AOL AOL Instant Messenger 4.7
- AOL AOL Instant Messenger 4.8
Aug 23, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this