Vulnerabilities > CVE-2005-1655 - Unspecified vulnerability in AOL Instant Messenger

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
aol
nessus
exploit available

Summary

AOL Instant Messenger 5.5.x and earlier allows remote attackers to cause a denial of service (client crash) via an invalid smiley icon location in the sml parameter of a font tag.

Exploit-Db

descriptionAOL Instant Messenger 4.x/5.x Smiley Icon Location Remote Denial Of Service Vulnerability. CVE-2005-1655. Dos exploit for windows platform
idEDB-ID:25633
last seen2016-02-03
modified2005-05-09
published2005-05-09
reporter[email protected]
sourcehttps://www.exploit-db.com/download/25633/
titleAOL Instant Messenger 4.x/5.x Smiley Icon Location Remote Denial of Service Vulnerability

Nessus

NASL familyWindows
NASL idAIM_SMILEY_LOCATION_DOS.NASL
descriptionAccording to the Windows registry, the remote host has installed on it a version of AOL Instant Messenger that does not properly handle invalid data passed as the location of a
last seen2020-06-01
modified2020-06-02
plugin id18299
published2005-05-19
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18299
titleAIM Smiley Icon Location Remote Denial Of Service
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(18299);
  script_version("1.16");

  script_cve_id("CVE-2005-1655");
  script_bugtraq_id(13553);

  script_name(english:"AIM Smiley Icon Location Remote Denial Of Service");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote Windows application is prone to denial of service attacks." );
 script_set_attribute(attribute:"description", value:
"According to the Windows registry, the remote host has installed on it a
version of AOL Instant Messenger that does not properly handle invalid
data passed as the location of a 'smiley' icon.  Such invalid data leads
to an application crash, possibly because of a buffer overflow." );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/19");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/10");
 script_cvs_date("Date: 2018/06/27 18:42:27");
script_set_attribute(attribute:"plugin_type", value:"local");
script_end_attributes();

  script_summary(english:"Checks for smiley icon location denial of service vulnerability in AIM");
  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("aim_detect.nasl");
  script_require_keys("AIM/version");

  exit(0);
}


# Test an install.
ver = get_kb_item("AIM/version");
if (ver) {
  # There's a problem if the newest version is 5.9.3702 or below.
  iver = split(ver, sep:'.', keep:FALSE);
  if (
    int(iver[0]) < 5 ||
    (
      int(iver[0]) == 5 && 
      (
        int(iver[1]) < 9 ||
        (int(iver[1]) == 9 && int(iver[2]) <= 3702)
      )
    )
  ) security_warning(get_kb_item("SMB/transport"));
}