AIM 4.8.2790 remote file execution vulnerability

From: Blud Clot (bludclotat_private)
Date: Mon Oct 21 2002 - 15:10:52 PDT

  • Next message: Jeff Moss: "Call For Papers Announcement: Black Hat Windows Security"

    Description: AOL Instant Messenger version 4.8.2790 will execute
    programs when a user clicks on a not-so-specially crafted hypertext
    link.
    
    Versions affected: AOL Instant Messenger 4.8.2790. 4.7.2480 is not
    vulnerable and neither is 5.0.2938. This bug was confirmed on both
    Windows 2000 and Windows ME. It is suspected that any version of
    windows would be vulnerable.
    
    AOL Contacted: July 25, 2002. Never sent a response.
    
    Details: When a malicious user sends a link pointing to an executable
    file and a victim clicks on said link, the file will be executed
    without any warning prompts. The url simply points to the filename.
    However, certain characters are not allowed including spaces. Thus
    the attacker is limited to running files on the same partition as the
    current directory and/or system folders. Since an attacker doesn't
    know the current directory they are likely to begin the url with a
    few "../../../../" to get to the root of the partition.
    Spaces cannot be entered, however this can be gotten around by using
    dos files names: i.e. "program files" becomes
    "progra~1". Here are a few examples:
    
    <a href = "notepad.exe">hi</a>
    <a href =
    "../../../../progra~1/trojan/trojan.exe">www.google.com</a>
    
    <a href =
    "../../../../you/get/the/point/exampl~1.exe">blah</a>
    
    
    All of these examples would run the program specified if the victim
    were to click on them.
    
    Solution: Upgrade or downgrade to any version of AIM other than
    4.8.2790. Always check hyperlink urls before clicking on them.
    
    Personal Note: This is such a stupid vulnerability and AOL are a
    bunch of asshol~1 for not even responding after months.
    
    -BludClot
    -- 
    ____________________________________________________
    Get your own Hello Kitty email @ www.sanriotown.com
    
    Powered by Outblaze
    



    This archive was generated by hypermail 2b30 : Tue Oct 22 2002 - 12:33:45 PDT