what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

aim.caching.txt

aim.caching.txt
Posted Nov 16, 2000
Authored by F3d

AOL Instant Messenger contains a caching vulnerability where once you have logged onto AIM with a screenname, you can permanently login with that screenname.

tags | exploit
SHA-256 | 082713c2e36c75c665e6bb56ba99874d4c5196b712c54fcc9aafe49eff7eae7f

aim.caching.txt

Change Mirror Download
% Advisory % Advisory % Advisory % Advisory % Advisory % Advisory % 

Author: f3d
Program: AOL Instant Messanger Servers/Clients
Fault: Caching vulnerability
Os: Win/BSD/*Aim compatible

% Advisory % Advisory % Advisory % Advisory % Advisory % Advisory %

Problem. There is a vulnerability in AOL Instant Messanger Client and or
Servers in which case they depends heavily upon caching, to heavily. The
problem with the servers and clients authentication method is, once you
have logged onto AIM with a screenname, you can permanentley login with
that screenname.

Explanation. I guess AOL went along with the "Once good always good" theory,
because even if an AOL member changes his/her password, if the correct
cache is on the computer for the previous password, you are still able to
login to AIM. This obviously shows that authentication is on a one time
basis, and thereafter, it is based upon some sort of algorithm, to speed
up login time and conserve system resources. Although this bug seems to
be very blunt, there is one hinderance, Instant Messages are disabled followed
by this error, and cannot your privacy settings cannot be reset:

"AOL Instant Messanger(SM) cannot send this message because you have blocked
the recipient. You can change this setting on the Privacy tab of the Preferences
dialog."

Other features, such as Chat, are not. This bug was found in the latest
beta release of AIM, and is believed to have effected all previous versions.
Anyone else noticed this? Or taken advantage of it in other ways?

Email: f3dster@hushmail.com

% Advisory % Advisory % Advisory % Advisory % Advisory % Advisory %
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close