Vulnerability Note VU#24447
AOL Instant Messenger exposes local file path during file transfers
AOL Instant Messenger (AIM) disclose local file paths during transfer.
AOL Instant Messenger (AIM) is a program for communicating with other users over the Internet. AIM permits users to transfer files from one client to another. When the file is transferred, the entire local path of the file on the sender's machine is sent to the recipient. This could pose privacy and security risks. An attacker could use this information to extrapolate the location of other files on the victim's machine, and use this information in conjunction with another vulnerability.
Unauthorized disclosure of information about the victim's machine is transmitted to the attacker.
The latest version of AIM allows the user to configure whether the recipient can see the full path of a transferred file. Upgrade to the latest build and enable this feature.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|AOL Time Warner||Affected||17 Oct 2001||28 Jan 2002|
CVSS Metrics (Learn More)
Our thanks to Daniel P. Stasinski <firstname.lastname@example.org>, who discovered this vulnerability.
This document was written by Jason Rafail
- CVE IDs: CAN-2000-0383
- Date Public: 08 May 2000
- Date First Published: 31 Jan 2002
- Date Last Updated: 31 Jan 2002
- Severity Metric: 0.69
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.