Ravens PHP Scripts

AOL Radio AmpX ActiveX Control Multiple Buffer Overflows
Date: Thursday, November 15, 2007 @ 23:57:08 PST
Topic: Security


SECUNIA ADVISORY ID: SA27622

VERIFY ADVISORY: http://secunia.com/advisories/27622/

CRITICAL: Highly critical

IMPACT: System access

WHERE: From remote

SOFTWARE: AOL Radio AmpX ActiveX Control 2.x - http://secunia.com/product/16511/

DESCRIPTION: Some vulnerabilities have been reported in AOL Radio, which can be exploited by malicious people to compromise a user's system.




The vulnerabilities are caused due to boundary errors in the AmpX ActiveX control (AmpX.dll) when handling arguments passed to certain unspecified methods. These can be exploited to cause stack-based buffer overflows by passing overly long arguments to the affected methods. Successful exploitation allows execution of arbitrary code. The vulnerabilities are reported in AmpX.dll version 2.6.1.11. Other versions may also be affected.

SOLUTION: Apply updates. - http://radaol-prod-web-rr.streamops.aol.com/mediaplugin/unagi_patch.exe

PROVIDED AND/OR DISCOVERED BY: Discovered by an anonymous researcher and reported via iDefense Labs.

ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=623






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=3144