lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071221231555.30778.qmail@securityfocus.com> Date: 21 Dec 2007 23:15:55 -0000 From: evanchik@...il.com To: bugtraq@...urityfocus.com Subject: America Online AOL Instant Messenger AIM6.0 or 6.5 or higher XSS remote execution Sorry for the brief post but Im still able to bypass filters that aol has put in place. So again with frustration I come to FD to imply pressure on a company to patch correct. From reading feedback from AOL they feel the vulnerability is put to bed and requires no more attention. I am not posting 0day PoC only currently patched examples. Do not use any AIM 6 or higher client. old PoC http://before0day.com/Lists/Posts/Post.aspx?ID=3 references http://www.wired.com/politics/security/news/2007/12/aim_hack http://www.pronetworks.org/index.php/software-and-betas-news/847#comment-199 http://talkback.zdnet.com/5208-12691-0.html?forumID=1&threadID=41986&messageID=785355&start=-1 Michael Evanchik http://before0day.com