Vulnerability Note VU#972499

AOL Instant Messenger vulnerable to buffer overflow via long filename

Original Release date: 14 Jan 2002 | Last revised: 14 Jan 2002


AOL Instant Messenger (AIM) is an application that allows one peer to communicate with another. A vulnerability exists that can crash the client of a victim.


AIM permits users to send files from one peer to another. By sending a file with a long name, it is possible to crash the client of the recipient.


By repeatedly sending this message with the file attached, a continued denial of service can be caused.


This has been resolved in AIM for Windows beta version 4.8.2540.

AIM permits the user to only accept messages from known/trusted peers. Enable this feature.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
AOL Time WarnerAffected17 Oct 200114 Jan 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was discovered by Robbie Saunders.

This document was written by Jason Rafail.

Other Information

  • CVE IDs: Unknown
  • Date Public: 06 Oct 2001
  • Date First Published: 14 Jan 2002
  • Date Last Updated: 14 Jan 2002
  • Severity Metric: 9.45
  • Document Revision: 9


If you have feedback, comments, or additional information about this vulnerability, please send us email.