First published: Tue Jan 09 2001(Updated: )
Buffer overflow in AOL Instant Messenger before 4.3.2229 allows remote attackers to execute arbitrary commands via a long "goim" command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AOL AIM Triton | =2.0_n | |
AOL AIM Triton | =2.5.1366 | |
AOL AIM Triton | =2.5.1598 | |
AOL AIM Triton | =3.0.1470 | |
AOL AIM Triton | =3.0_n | |
AOL AIM Triton | =3.5.1635 | |
AOL AIM Triton | =3.5.1670 | |
AOL AIM Triton | =3.5.1808 | |
AOL AIM Triton | =3.5.1856 | |
AOL AIM Triton | =4.0 | |
AOL AIM Triton | =4.1.2010 | |
AOL AIM Triton | =4.2.1193 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1093 has a high severity due to the potential for remote code execution.
To fix CVE-2000-1093, upgrade to a version of AOL Instant Messenger that is 4.3.2229 or later.
CVE-2000-1093 affects various versions of AOL Instant Messenger prior to 4.3.2229.
Yes, CVE-2000-1093 can be exploited remotely through a long 'goim' command sent by an attacker.
Exploiting CVE-2000-1093 could allow attackers to execute arbitrary commands on the victim's system.