One-to-One
News
9/27/2007
04:07 PM
50%
50%

AOL Working On Patch For Instant Messenger Vulnerability

Security researchers disclosed a bug in AIM that could enable a hacker to remotely execute malicious code and exploit Internet Explorer bugs.

America Online is working on a patch for what security researchers are calling a "major vulnerability" in the company's highly popular Instant Messenger application.

Researchers at Core Security Technologies Wednesday disclosed a bug that they say could severely impact the millions of registered users of AOL's instant-messaging service, AIM. The flaw, according to Core Security, would enable a series of attacks -- enabling a remote hacker to execute malicious code, exploit Internet Explorer bugs, and inject scripting code in the IE browser.

"This vulnerability poses a significant security risk to millions of AIM users," said Ivan Arce, CTO at Core Security, in a written statement. "Core Security has alerted AOL to this threat and has provided full technical details about the vulnerability so that they can address it in their products. Since we notified AOL, this vulnerability has emerged on several public bug-tracking Web sites. Therefore, we believe it is necessary to bring precise details about this issue to light immediately, so that AIM users and organizations using AIM can be made aware of the threat, assess their risk, and take the appropriate measures to ensure that they are protected."

In a response e-mailed to InformationWeek, an AOL spokesman said its technicians are working on the problem.

"The safety and security of AIM users is of utmost importance to us," she wrote. "To that end, we quickly take the necessary steps to block malicious content from reaching our users. We have addressed the issues that Core Security has brought to us on the server side. We are comfortable with the server side fixes we have in place, but we are also working on a client fix."

According to Core Security, the vulnerability affects AIM V6.1, as well as the V6.2 beta, which is the latest version of AOL's instant messaging application. It also affects AIM Pro, the instant messaging version for corporate users, and AIM Lite, a simplified version of the client application.

The security company is suggesting that AIM users running vulnerable client software switch to AIM V5.9, the latest version of the AIM client 6.5, which is still in beta, or the web-based AIM Express.

The researchers did not give any specific details about the bug, but did note that all of the vulnerable AIM clients include support for enhanced message types that enable AIM users to take advantage of HTML to customize text messages with different fonts and colors.

The bug reportedly allows remote arbitrary code execution, direct exploitation of IE bugs without user interaction, injection of scripting code in IE, and cross-site request forgery.

Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 Digital Issue, April 2015
The 27th annual ranking of the leading US users of business technology
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.