[36110] in bugtraq

home help back first fref pref prev next nref lref last post

Re: AOL Instant Messenger "Away" Message Buffer Overflow Vulnerability

daemon@ATHENA.MIT.EDU (High Pressure)
Thu Aug 12 20:56:15 2004

Message-ID: <a4a571f6040812140020bcd11a@mail.gmail.com>
Date: Thu, 12 Aug 2004 17:00:29 -0400
From: High Pressure <pressure@gmail.com>
To: Thor Larholm <tlarholm@pivx.com>
Cc: bugtraq@securityfocus.com,
        Windows NTBugtraq Mailing List <ntbugtraq@listserv.ntbugtraq.com>
In-Reply-To: <653D74053BA6F54A81ED83DCF969DF082D5879@pivxes1.pivx.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

If you're running NT/2000/XP, you can delete everything under the key
and make it read-only -- or just deny everyone access to the key.

On Wed, 11 Aug 2004 14:02:50 -0700, Thor Larholm <tlarholm@pivx.com> wrote:
> Deleting the "HKEY_CLASSES_ROOT\aim" registry key is not a permanent
> mitigation but a per-session change that has to be implemented every
> time AOL Instant Messenger is instantiated. The reason for this is that
> if the HKCR\aim key is missing when AIM is launched AIM will simply
> recreate the key and thus the URL protocol.

-- 
Please don't send anything confidential to this address. More info:
http://www.gmail-is-too-creepy.com/

home help back first fref pref prev next nref lref last post