AOL Radio AmpX ActiveX Control Multiple Buffer Overflows

Posted on Thursday, November 15, 2007 @ 23:57:08 CST in Security
by Raven

SECUNIA ADVISORY ID: SA27622

VERIFY ADVISORY: http://secunia.com/advisories/27622/

CRITICAL: Highly critical

IMPACT: System access

WHERE: From remote

SOFTWARE: AOL Radio AmpX ActiveX Control 2.x - http://secunia.com/product/16511/

DESCRIPTION: Some vulnerabilities have been reported in AOL Radio, which can be exploited by malicious people to compromise a user's system.


The vulnerabilities are caused due to boundary errors in the AmpX ActiveX control (AmpX.dll) when handling arguments passed to certain unspecified methods. These can be exploited to cause stack-based buffer overflows by passing overly long arguments to the affected methods. Successful exploitation allows execution of arbitrary code. The vulnerabilities are reported in AmpX.dll version 2.6.1.11. Other versions may also be affected.

SOLUTION: Apply updates. - http://radaol-prod-web-rr.streamops.aol.com/mediaplugin/unagi_patch.exe

PROVIDED AND/OR DISCOVERED BY: Discovered by an anonymous researcher and reported via iDefense Labs.

ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=623