AOL Instant Messenger Password Encryption Weakness

medium Nessus Network Monitor Plugin ID 1259

Synopsis

The remote host passes information across the network in an insecure manner

Description

The remote host is running AOL Instant Messenger (AIM). Version 1.2 of AIM uses a very weak encryption scheme to protect user passwords. A remote attacker may determine a user's password given only the encrypted form of the password (by sniffing the login process for example).

Solution

Upgrade to the latest version of AOL Instant Messenger.

Plugin Details

Severity: Medium

ID: 1259

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:aol:aim

Reference Information

BID: 6777