America Online (AOL) has published a workaround for a flaw reported in its Instant Messenger system, AIM.
The flaw, a buffer overflow vulnerability that affects all Windows versions of the software, could allow malicious code to be inserted onto a user machine if the user clicks on a malicious URL in an instant message or a web page.
AOL is recommending that Windows users upgrade to a new beta version of its messaging software due to be released later this week.
"This new version of AIM will address the vulnerability and can be obtained via the AIM portal," the company said in a statement.
For users of the existing code, AOL recommends removing the 'HKEY_CLASSES_ROOT\aim' command from the PC system registry.
The flaw was found by security specialist iDefense a month ago; the companies said they have been working together to find a solution.
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software