Core Security discloses AIM vulnerability

Share this article:
Millions of computers with registered copies of AOL Instant Messenger (AIM) are at risk to a variety of attacks via a vulnerability in AIM 6.1, AIM beta 6.2, AIM Pro and AIM Lite, according to researchers at Core Security.

The flaw, which exists in AIM's HTML rendering function that relies on an embedded Internet Explorer (IE) server control, could allow an attacker to deliver malicious HTML code as part of a conversation, according to Core. This permits an attacker to exploit IE without user interaction, or target security configuration weaknesses in the browser.

Researchers at CoreLabs said they exploited this vulnerability to launch several types of attacks on workstations running AIM, including remote execution of arbitrary commands without user interaction. They were also able to exploit IE bugs without user interaction and to inject scripting code, such as JavaScript, into the embedded IE control of the AIM client.

Other flaws included remote exploitation of ActiveX controls in the corresponding security zone and cross-site request forgery and token and cookie manipulation using embedded HTML.

Ivan Arce, Core Security chief technology officer, told SCMagazineUS.com on Tuesday that the company discovered the flaw on Aug. 1 and reported it to AOL on Aug. 21 after investigating the problem for three weeks.

Core recommends that users download and install a non-vulnerable version of AIM or use AOL's web-based AIM Express service until AOL has fixed the problem. Classic AIM 5.9 and the beta version of the next release (6.5.3.12) are not vulnerable to the flaw, according to Arce.

“[The types of vulnerabilities can appear when an application] offers more functionality and becomes more complex," as was the case when AOL moved from AIM 5.9 to 6.1, Arce told SCMagazineUS.com. "When you expand the footprint and complexity of an application, it's more prone to problems, and that's exactly what happened in this case."

Core said AOL has acknowledged the problem and recommends that AIM users upgrade to the latest version of the AIM beta client, which can be downloaded here.

"The safety and security of AIM users is of utmost importance to us," AOL said in a statement. "To that end, we quickly take the necessary steps to block malicious content from reaching our users. We have resolved all of the issues presented to us by Core Security within all past, current and future versions of AIM."

Core Security, however, "believes otherwise."

Core said in a prepared release that the fix in place is a “Band-Aid,” covering only exploitation over the IM channel on AOL server, but many AIM users are still at risk.
Share this article:

Sign up to our newsletters

More in News

Instagram iOS and Android apps vulnerable to session hijacking

Two researchers wrote about the Instagram app for iOS and Android is vulnerable to session hijacking because both send unsecured information through HTTP.

Report: Hackers stole data from Israeli defense firms

A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.

Neverquest trojan targets regional banks in Japan

Symantec researchers found a new variant of the banking trojan.