[Am-info] AOL Instant Messenger Data Interception Vulnerability

Fred A. Miller fm@cupserv.org
Mon, 29 Apr 2002 16:22:00 -0400


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

AOL Instant Messenger Data Interception Vulnerability
BugTraq ID: 4574
Remote: Yes
Date Published: Apr 21 2002 12:00A
Relevant URL:
http://www.securityfocus.com/bid/4574
Summary:

It is reportedly possible for a remote attacker to force a direct
connection or file transfer with an AOL Instant Messenger (AIM) client.

AIM accepts connections on port 4443 for direct connections and port 5190
for file transfers.  It is reportedly possible for an arbitrary host to
connect to these ports and receive data that the client happens to be
sending.  It has been reported that this situation is exploited by making
rapid connections to ports 4443 and 5190 in an attempt to connect to the
client at the moment it is sending the data.

A remote attacker may exploit this issue to intercept sensitive data that
the client is sending to another AIM user.

- --=20
Fred A. Miller
Systems Administrator
Cornell Univ. Press Services
fm@cupserv.org, www.cupserv.org
- --- SuSE Linux v8.0 Pro---



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjzNq2gACgkQB9vk4ichYXfYTwCbBBpUSbhaTOr5Jw190vPRAZEh
rFMAn3OTB9qdJqKAtk+EjustdRo6QcRh
=3Da4Fm
-----END PGP SIGNATURE-----