Overview
The AOL AOLMediaPlaybackControl application contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
AOL Radio includes several ActiveX controls to stream audio in web pages. The AOL AmpX and CoAxTrack ActiveX controls, which are provided by AmpX.dll and axtrack.dll respectively, use a program called AOLMediaPlaybackControl.exe. The AOLMediaPlaybackControl application contains a stack buffer overflow that is exploitable via the AppendFileToPlayList() method in the AmpX and CoAxTrack ActiveX controls. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. |
Solution
Apply an update This vulnerability is addressed in automatic updates provided by AOL, which remove the AmpX control and AOLMediaPlaybackControl.exe. AOL update 4194.13.4 contains the fix for U.S. versions of AOL, and 4195.9.4 contains the fix for international versions. This update is also available as a manual install as the Unagi update. The AmpX ActiveX control version 2.6.2.6 also appears to prevent the buffer overflow vulnerability in AOLMediaPlaybackControl.exe from being reached. If you are unable to apply an update, please consider the following workarounds. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2007-6250 |
Severity Metric: | 4.65 |
Date Public: | 2008-01-09 |
Date First Published: | 2008-01-09 |
Date Last Updated: | 2008-01-31 20:33 UTC |
Document Revision: | 15 |