First published: Thu Sep 27 2007(Updated: )
The embedded Internet Explorer server control in AOL Instant Messenger (AIM) 6.5.3.12 and earlier allows remote attackers to execute arbitrary code via unspecified web script or HTML in an instant message, related to AIM's filtering of "specific tags and attributes" and the lack of Local Machine Zone lockdown. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4901.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AOL AIM Triton | <=6.5.3.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5124 is considered a high-severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2007-5124, users should upgrade to the latest version of AOL Instant Messenger or disable the embedded Internet Explorer server control.
CVE-2007-5124 affects AOL Instant Messenger versions up to and including 6.5.3.12.
Yes, CVE-2007-5124 can be exploited via malicious web scripts or HTML sent through instant messages.
There is no specific patch for CVE-2007-5124; the recommended action is to update to the latest version of the software.