SECUNIA ADVISORY ID: SA27622
VERIFY ADVISORY: http://secunia.com/advisories/27622/
CRITICAL: Highly critical
IMPACT: System access
WHERE: From remote
SOFTWARE: AOL Radio AmpX ActiveX Control 2.x - http://secunia.com/product/16511/
DESCRIPTION: Some vulnerabilities have been reported in AOL Radio, which can be exploited by malicious people to compromise a user's system.
The vulnerabilities are caused due to boundary errors in the AmpX ActiveX control (AmpX.dll) when handling arguments passed to certain unspecified methods. These can be exploited to cause stack-based buffer overflows by passing overly long arguments to the affected methods. Successful exploitation allows execution of arbitrary code. The vulnerabilities are reported in AmpX.dll version 2.6.1.11. Other versions may also be affected.
SOLUTION: Apply updates. - http://radaol-prod-web-rr.streamops.aol.com/mediaplugin/unagi_patch.exe
PROVIDED AND/OR DISCOVERED BY: Discovered by an anonymous researcher and reported via iDefense Labs.
ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=623
AOL Radio AmpX ActiveX Control Multiple Buffer OverflowsPosted on Thursday, November 15, 2007 @ 23:57:08 CST in Security |