Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

AOL Instant Messenger Filename Handling Format String



The remote host is vulnerable to format string flaw


The remote host is running AOL Instant Messenger (AIM). Version 4.1.2010 of AIM is vulnerable to a format string attack that may exploited by an attacker to crash a victim's IM client, leading to a denial of service. The vulnerability lies in AIM's improper handling of file transfers of filenames containing "%s".


Upgrade to the latest version of AOL Instant Messenger.