Feeds

AOL buddy-hole fix has backdoor

'You've got bugs'

  • alert
  • submit to reddit

High performance access to file storage

A member of w00w00, the security enthusiasts who first reported the AOL Instant Messenger (AIM) games request vulnerability, has alerted users that a fix the group recommends has its own backdoor.

Apparently, the AIM Filter by Robbie Saunders which w00w00 had recommended is infected, group member Jordan Ritter disclosed on the Bugtraq mailing list late Tuesday.

"At the time, Robbie Saunders' AIM Filter seemed like a nice temporary solution. Unfortunately, it instead produces cash-paid click-throughs over time intervals and contains backdoor code combined with basic obfuscation to divulge system information and launch several Web browsers to porn sites," Ritter wrote.

"We only took the time to verify that it blocked the attack, since an analysis of AIM filter wasn't our priority. Mea culpa."

w00w00 has since devised a clean version of AIM Filter.

Meanwhile, Saunders says on his Web site that the advisory is overstated.

"The filter enables the user on the screen name 'robbieiship' to use two admin commands: 1) get your IP and build number [in case I should feel like reporting you to your ISP]; 2) shut down your AIM Filter and open five embarrassing Web sites [in case you mess with my friends]."

"The cash-paid click-throughs are because I need money and they only go in once (when you open the filter) and not on time intervals like w00w00 claims."

A subsequent post to Bugtraq by w00w00 member Tim Yardley supports part of this claim, but not all of it.

"The query user packet would send a message to Robbie Saunders with the IP address of your machine. The DC [direct connection?] packet would open four Web browsers to various porn sites."

"The DC loop packet would send the DC packet in a message over and over, until length of 7900 was reached (max transmission size I guess). On connect, the software would connect to two different sites using Robbie's click ID (to generate money for him). There was also a timer that did this same thing."

So there we have two slightly different accounts, but general consensus that AIM FIlter isn't a terribly dangerous thing, if not terribly polite.

As for those who installed AIM Filter, so far as we know at the moment, removing it is all that's required to defeat it. We will of course follow up if anything further emerges. ®

Related Stories

AIM gives up control of Windows machines
AOL bungs buddy-list security hole

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.