First published: Mon Dec 11 2000(Updated: )
Format string vulnerability in AOL Instant Messenger (AIM) 4.1.2010 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by transferring a file whose name includes format characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AOL AIM Triton | =4.1.2010 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1000 is classified as a high severity vulnerability due to its potential for remote exploitation and denial of service.
To fix CVE-2000-1000, users should upgrade to a patched version of AOL Instant Messenger that resolves the format string vulnerability.
CVE-2000-1000 can be exploited through specially crafted file transfers that contain format characters, leading to denial of service or arbitrary command execution.
CVE-2000-1000 specifically affects AOL Instant Messenger version 4.1.2010.
While CVE-2000-1000 is an older vulnerability, its threat level may still be relevant for systems that continue to run the affected version of AOL Instant Messenger.