lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <f1d746770601292152n2def9460n@mail.gmail.com> Date: Mon Jan 30 09:05:27 2006 From: shell6 at gmail.com (Shell) Subject: AOL Instant Messenger 5.9.3861 Local Buffer Overrun Vulnerability I have discovered that there is a buffer overrun vulnerability in AOL's Instant Messenger program. I have only tested this on version 5.9.3861. The problem causes a minimum of a program crash. I am not sure as to the posibility of shellcode execution. The vulnerability can be exploited by supplying an overly large username from which to obtain "buddy info." If you are unsure as to what I am talking about, I can post a screenshot. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060130/339180d8/attachment.html