Vulnerability Description
Buffer overflow in AOL Instant Messenger (AIM) before 4.3.2229 allows remote attackers to execute arbitrary commands via a "buddyicon" command with a long "src" argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aol | Aim | < 4.3.2229 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=97668265628917&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=97683774417132&w=2Third Party Advisory
- http://www.atstake.com/research/advisories/2000/a121200-1.txtBroken LinkExploitPatch
- http://www.osvdb.org/1692Broken Link
- http://marc.info/?l=bugtraq&m=97668265628917&w=2Third Party Advisory
- http://marc.info/?l=bugtraq&m=97683774417132&w=2Third Party Advisory
- http://www.atstake.com/research/advisories/2000/a121200-1.txtBroken LinkExploitPatch
- http://www.osvdb.org/1692Broken Link
FAQ
What is CVE-2000-1094?
CVE-2000-1094 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in AOL Instant Messenger (AIM) before 4.3.2229 allows remote attackers to execute arbitrary commands via a "buddyicon" command with a long "src" argument.
How severe is CVE-2000-1094?
CVE-2000-1094 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-1094?
Check the references section above for vendor advisories and patch information. Affected products include: Aol Aim.