Re: AIM addendum

From: austin naremore (austinat_private)
Date: Thu Jan 03 2002 - 13:56:48 PST

  • Next message: Keith Dallara: "Mail.com Cross Site Scripting Vulnerability"

    it was fixed this morning
    
    AOL returns a nice message too:
    
    Error: message to <screenname here> bounced (Busted SNAC payload)
    
    > AIM fixed?  Can anyone confirm?
    > 
    > http://www.msnbc.com/modules/exports/ct_email.asp?/news/680950.asp
    > 
    > Thanks,
    > 
    > Mark C.
    > 
    > 
    > ----- Original Message -----
    > From: Matt Conover <shokat_private>
    > To: Paul Schmehl <paulsat_private>
    > Cc: <bugtraqat_private>
    > Sent: Wednesday, January 02, 2002 12:00 PM
    > Subject: Re: AIM addendum
    > 
    > 
    > > > The temporary solution you provide would only protect you so long 
    as all
    > > > the buddies on your list were not compromised.  As soon as one 
    buddy is
    > > > compromised, then you are vulnerable *through* that buddy.  Or am 
    I not
    > > > clearly understanding this exploit?
    > >
    > > Yes, which is why in the original advisory we recommended AIM 
    filter be
    > > installed. This will block the attack from anyone. So only allowing 
    your
    > > buddies to contact you in addition to installing AIM filter will 
    keep you
    > > secure until a new version of AIM comes out.
    > 
    > 
    > 
    



    This archive was generated by hypermail 2b30 : Thu Jan 03 2002 - 16:28:26 PST