First published: Mon Aug 12 2002(Updated: )
AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AOL AIM Triton | =4.0 | |
AOL AIM Triton | =4.1 | |
AOL AIM Triton | =4.1.2010 | |
AOL AIM Triton | =4.2 | |
AOL AIM Triton | =4.2.1193 | |
AOL AIM Triton | =4.3 | |
AOL AIM Triton | =4.3.2229 | |
AOL AIM Triton | =4.4 | |
AOL AIM Triton | =4.5 | |
AOL AIM Triton | =4.6 | |
AOL AIM Triton | =4.7 | |
AOL AIM Triton | =4.7.2480 | |
AOL AIM Triton | =4.8.2616 | |
AOL AIM Triton | =4.8.2646 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0785 is classified as a denial of service vulnerability that can crash AOL Instant Messenger.
To fix CVE-2002-0785, users should upgrade to the latest version of AOL Instant Messenger that addresses this vulnerability.
CVE-2002-0785 affects AOL Instant Messenger versions 4.0 through 4.8.2646.
Yes, CVE-2002-0785 can be exploited remotely by sending a specially crafted 'AddBuddy' link.
The denial of service in CVE-2002-0785 is caused by a buffer overflow triggered by a large number of comma-separated values in the ScreenName parameter.