There is a remotely exploitable buffer overflow in ICQ. Attackers that are able to exploit the vulnerability may be able to execute arbitrary code with the privileges of the victim user.
ICQ is a program for communicating with other users over the Internet. ICQ is widely used (by over 122 million people according to ICQ Inc, an AOL Time Warner owned subsidiary). A buffer overflow exists in the ICQ client for Windows. The buffer overflow occurs during the processing of a Voice Video & Games feature request message. This message is supposed to be a request from another ICQ user inviting the victim to participate interactively with a third-party application. In versions prior to 2001B, the buffer overflow occurs in code within the ICQ client. In version 2001B the code containing the buffer overflow was moved to an external plug-in.
Therefore, all versions prior to the latest build of 2001B are vulnerable. Upon connection to an AOL ICQ server, vulnerable builds of the 2001B client will be instructed by the server to disable the vulnerable plug-in. Since versions of the ICQ client prior to 2001B do not have an external plug-in to disable, they are vulnerable even after connecting to the server. AOL Time Warner is recommending all users of vulnerable versions of ICQ upgrade to 2001B Beta v5.18 Build #3659.
Exploitation of the buffer overflow may allow a remote attacker to execute arbitrary code on the victim's system.
There is currently no patch available for the ICQ plug-in for 2001B or versions of the ICQ client prior to 2001B. All users should upgrade to version 2001B Beta v5.18 Build #3659, whose installer will delete the vulnerable plug-in. In addition access to the vulnerable plug-in will be disabled for users with versions of 2001B prior to Beta v5.18 Build #3659 who login to the server.
Block ICQ/SMS requests at the firewall
Our thanks to Daniel Tan, who discovered this vulnerability and aided in its analysis.
This document was written by Jason Rafail.
|Date First Published:||2002-01-15|
|Date Last Updated:||2002-01-24 19:11 UTC|