Feeds

AOL ICQ in hacker risk alert

Buffer overflow needs to be slayed

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

A remotely exploitable buffer overflow glitch poses a risk for AOL ICQ users who have failed to apply a security fix, CERT warned yesterday.

It says attackers who are able to exploit the vulnerability may be able to execute arbitrary code with the privileges of the victim user.

An exploit is known to exist, but it is not believed to be widely distributed. Nor is there any evidence of crackers scanning the Internet in search of vulnerable machines.

Since ICQ is used by an estimated 122 million users, the vulnerability is still a concern.

The buffer overflow, which affects AOL Mirabilis ICQ Versions 2001A and prior, occurs during the processing of a Voice, Video & Games feature request message.

As with the AOL Instant Messenger AIM vulnerability (discovered earlier this month), AOL has modified the ICQ server infrastructure to filter malicious messages that attempt to exploit this vulnerability. However exploiting the vulnerability through other means (man-in-the-middle attacks, third-party ICQ servers, DNS spoofing, network sniffing, etc.) may still be possible.

AOL Time Warner is recommending all users of vulnerable versions of ICQ upgrade to 2001B Beta v5.18 Build #3659. ®

External links

CERT Advisory: buffer overflow in AOL ICQ

Related Stories

Google calls time on AIMSearch prank
AOL bungs buddy-list security hole
AIM gives up control of Windows machines
AOL buddy-hole fix has backdoor
AOL/Netscape sues MS
AOL shadows Microsoft on instant alerts

Secure remote control for conventional and virtual desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.