First published: Tue Jan 09 2001(Updated: )
Buffer overflow in AOL Instant Messenger (AIM) before 4.3.2229 allows remote attackers to execute arbitrary commands via a "buddyicon" command with a long "src" argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AOL Instant Messenger | =4.0 | |
AOL Instant Messenger | =3.5.1856 | |
AOL Instant Messenger | =3.0_n | |
AOL Instant Messenger | =4.1.2010 | |
AOL Instant Messenger | =3.5.1635 | |
AOL Instant Messenger | =2.0_n | |
AOL Instant Messenger | =2.5.1598 | |
AOL Instant Messenger | =3.0.1470 | |
AOL Instant Messenger | =3.5.1808 | |
AOL Instant Messenger | =4.2.1193 | |
AOL Instant Messenger | =3.5.1670 | |
AOL Instant Messenger | =2.5.1366 | |
AOL Instant Messenger Lite | <4.3.2229 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1094 has a severity rating of medium due to its potential to allow remote code execution.
To fix CVE-2000-1094, upgrade AOL Instant Messenger to version 4.3.2229 or later.
CVE-2000-1094 affects various versions of AOL Instant Messenger up to 4.2.1193.
CVE-2000-1094 is a buffer overflow vulnerability that can be exploited via specially crafted commands.
Yes, CVE-2000-1094 can be exploited remotely by attackers through the buddyicon command.