AOL CDDBControl ActiveX Control *SetClientInfo()* Buffer Overflow

Posted on Friday, December 08, 2006 @ 07:00:32 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23043

VERIFY ADVISORY: http://secunia.com/advisories/23043/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE:
AOL 9.x - http://secunia.com/product/6840/
AOL 8.x - http://secunia.com/product/6839/
AOL 7.x - http://secunia.com/product/585/

DESCRIPTION: Secunia Research has discovered a vulnerability in AOL, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error within the "CDDBControlAOL.CDDBAOLControl" ActiveX control (cddbcontrol.dll) when processing the first argument passed to the "SetClientInfo()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (more than 256 bytes). Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website with Internet Explorer. The vulnerability is confirmed in America Online 7.0 revision 4114.563, AOL 8.0 revision 4129.230, and AOL 9.0 Security Edition revision 4156.910. Other versions may also be affected.

SOLUTION: Updates are automatically available for AOL 9.x users when logging into the AOL service.

PROVIDED AND/OR DISCOVERED BY: Carsten Eiram, Secunia Research.

ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2006-69/