AOL Instant Messenger本地文件执行漏洞

漏洞信息详情

AOL Instant Messenger本地文件执行漏洞

漏洞简介

AOL Instant Messenger (AIM) 4.8.2790版本存在目录遍历漏洞。远程攻击者通过修改连接中href属性的程序执行任意程序。

漏洞公告

This issue is reportedly only present in AOL Instant Messenger 4.8.2790. Users may address this vulnerability by upgrading or downgrading to another version.

参考网址

来源: XF
名称: aim-url-execute-files(10441)
链接:http://www.iss.net/security_center/static/10441.php

来源: BID
名称: 6027
链接:http://www.securityfocus.com/bid/6027

来源: BUGTRAQ
名称: 20021021 AIM 4.8.2790 remote file execution vulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2002-10/0319.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享