AOL Instant Messenger Heap Overflow

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The previously reported AOL Instant Messenger heap overflow is restricted to
the "goim" handler.  The unchecked escaping is performed on the "screenname"
query string parameter.  The vulnerability is exploited when the user clicks
"Get Info" to request information on the buddy.

AIM dies with an access violation when trying to execute 0x656C6261.  As
there is nothing stored there, AIM faults and dies:

 EAX = 000000A0 EBX = 00000000 ECX = 00000003 EDX = 00A00000 ESI = 00C90A00
EDI = 010B3E90
 EIP = 656C6261 ESP = 0063F42C EBP = 6C696176 EFL = 00010206 CS = 017F DS =
0187 ES = 0187
 SS = 0187 FS = 2FAF GS = 0000 OV=0 UP=0 EI=1 PL=0 ZR=0 AC=0 PE=1 CY=0
 ST0 = +0.00000000000000000e+0000 ST1 = +0.00000000000000000e+0000
 ST2 = +0.00000000000000000e+0000 ST3 = +0.00000000000000000e+0000
 ST4 = +0.00000000000000000e+0000 ST5 = +1.95075000000000000e+0005
 ST6 = +4.30449203000000000e+0008 ST7 = +1.00000000000000000e+0000 CTRL =
027F STAT = 4020
 TAGS = FFFF EIP = 70CC8ECD CS = 017F DS = 0187 EDO = 70CC8E48

This vulnerability is really not a serious one, given the high level of user
interaction required for successful exploitation.  I tried to "spray" data
on the heap to overwrite other structures, but this proved useless.

"The reason the mainstream is thought
of as a stream is because it is
so shallow."
                     - Author Unknown


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux