AOL Instant Messenger is still susceptible to bypass vulnerabilities.
721b5b23ee157fba37dbb415019ee72fc4053c534d75d6df22b8469decd9ddbc
Sorry for the brief post but Im still able to bypass filters that aol has
put in place. So again with frustration I come to FD to imply pressure on a
company to patch correct. From reading feedback from AOL they feel the
vulnerability is put to bed and requires no more attention.
I am not posting 0day PoC only currently patched examples.
Do not use any AIM 6 or higher client.
old PoC
https://before0day.com/Lists/Posts/Post.aspx?ID=3
references
https://www.wired.com/politics/security/news/2007/12/aim_hack
https://www.pronetworks.org/index.php/software-and-betas-news/847#comment-199
https://talkback.zdnet.com/5208-12691-0.html?forumID=1&threadID=41986&messageID=785355&start=-1
greets:
HaZe, illwill,kurupt
Michael Evanchik
https://before0day.com