lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2b1119960712211518y70c3aad4vea3e8fe53a39d8f3@mail.gmail.com>
Date: Fri, 21 Dec 2007 18:18:18 -0500
From: "Michael Evanchik" <evanchik@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: AOL Instant Messenger AIM 6.0 or 6.5 Beta or
	higher local zone XSS

Sorry for the brief post but Im still able to bypass filters that aol has
put in place.  So again with frustration I come to FD to imply pressure on a
company to patch correct.  From reading feedback from AOL they feel the
vulnerability is put to bed and requires no more attention.

I am not posting 0day PoC only currently patched examples.

Do not use any AIM 6 or higher client.

old PoC
http://before0day.com/Lists/Posts/Post.aspx?ID=3


references
http://www.wired.com/politics/security/news/2007/12/aim_hack

http://www.pronetworks.org/index.php/software-and-betas-news/847#comment-199

http://talkback.zdnet.com/5208-12691-0.html?forumID=1&threadID=41986&messageID=785355&start=-1


greets:
HaZe, illwill,kurupt


Michael Evanchik
http://before0day.com

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ