First published: Tue Dec 31 2002(Updated: )
Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects "Get Info" on the buddy.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AOL AIM Triton | =4.4 | |
AOL AIM Triton | =4.5 | |
AOL AIM Triton | =4.6 | |
AOL AIM Triton | =4.7 | |
AOL AIM Triton | =4.7.2480 | |
AOL AIM Triton | =4.8.2616 | |
AOL AIM Triton | =4.8.2646 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1953 is classified as a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2002-1953, users should upgrade to a version of AOL Instant Messenger that is not affected by this vulnerability.
CVE-2002-1953 affects AOL Instant Messenger versions 4.4 through 4.8.2646.
CVE-2002-1953 is a heap-based buffer overflow vulnerability.
Yes, CVE-2002-1953 can be exploited remotely, allowing attackers to crash the application.