Buffer overflow in AOL Instant Messenger (AIM) before 4.3.2229 allows remote attackers to execute arbitrary commands via a "buddyicon" command with a long "src" argument.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=97668265628917&w=2 | Third Party Advisory |
http://marc.info/?l=bugtraq&m=97683774417132&w=2 | Third Party Advisory |
http://www.atstake.com/research/advisories/2000/a121200-1.txt | Broken Link Exploit Patch Vendor Advisory |
http://www.osvdb.org/1692 | Broken Link |
http://marc.info/?l=bugtraq&m=97668265628917&w=2 | Third Party Advisory |
http://marc.info/?l=bugtraq&m=97683774417132&w=2 | Third Party Advisory |
http://www.atstake.com/research/advisories/2000/a121200-1.txt | Broken Link Exploit Patch Vendor Advisory |
http://www.osvdb.org/1692 | Broken Link |
Configurations
History
20 Nov 2024, 23:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=97668265628917&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=97683774417132&w=2 - Third Party Advisory | |
References | () http://www.atstake.com/research/advisories/2000/a121200-1.txt - Broken Link, Exploit, Patch, Vendor Advisory | |
References | () http://www.osvdb.org/1692 - Broken Link |
09 Feb 2024, 03:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:aol:instant_messenger:4.0:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:3.5.1670:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:3.5.1635:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:3.0_n:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:3.0.1470:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:4.1.2010:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:3.5.1856:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:3.5.1808:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:4.2.1193:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:2.5.1366:*:*:*:*:*:*:* cpe:2.3:a:aol:instant_messenger:2.5.1598:*:*:*:*:*:*:* |
cpe:2.3:a:aol:aim:*:*:*:*:*:*:*:* |
First Time |
Aol aim
|
|
CWE | CWE-120 | |
References | (ATSTAKE) http://www.atstake.com/research/advisories/2000/a121200-1.txt - Broken Link, Exploit, Patch, Vendor Advisory | |
References | (OSVDB) http://www.osvdb.org/1692 - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=97668265628917&w=2 - Third Party Advisory | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=97683774417132&w=2 - Third Party Advisory |
Information
Published : 2001-01-09 05:00
Updated : 2024-11-20 23:33
NVD link : CVE-2000-1094
Mitre link : CVE-2000-1094
CVE.ORG link : CVE-2000-1094
JSON object : View
Products Affected
aol
- aim
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')