Description
Buffer overflow in AOL Instant Messenger (AIM) 4.7.2480, 4.8.2616, and other versions allows remote attackers to execute arbitrary code via a long argument in a game request (AddGame).
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Matt Conover · textremotewindows
https://www.exploit-db.com/exploits/21196
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/7743
Exploit, Vendor Advisory mailing-list
x_refsource_ntbugtraq
http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0201&L=ntbugtraq&F=P&S=&P=72
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/3769
Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/247944
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/907819
Various Sources mailing-list
x_refsource_ntbugtraq
http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0201&L=ntbugtraq&F=P&S=&P=198
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=ntbugtraq&m=100998295512885&w=2
Scores
EPSS
0.2793
EPSS Percentile
96.5%
Details
Status
published
Products (8)
aol/instant_messenger
4.3
aol/instant_messenger
4.3.2229
aol/instant_messenger
4.4
aol/instant_messenger
4.5
aol/instant_messenger
4.6
aol/instant_messenger
4.7
aol/instant_messenger
4.7.2480
aol/instant_messenger
4.8.2616
Published
Jan 31, 2002
Tracked Since
Feb 18, 2026