The AOL AOLMediaPlaybackControl application contains a stack buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
AOL Radio includes several ActiveX controls to stream audio in web pages. The AOL AmpX and CoAxTrack ActiveX controls, which are provided by AmpX.dll and axtrack.dll respectively, use a program called AOLMediaPlaybackControl.exe. The AOLMediaPlaybackControl application contains a stack buffer overflow that is exploitable via the AppendFileToPlayList() method in the AmpX and CoAxTrack ActiveX controls.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Apply an update
This vulnerability is addressed in automatic updates provided by AOL, which remove the AmpX control and AOLMediaPlaybackControl.exe. AOL update 4194.13.4 contains the fix for U.S. versions of AOL, and 4195.9.4 contains the fix for international versions. This update is also available as a manual install as the Unagi update. The AmpX ActiveX control version 188.8.131.52 also appears to prevent the buffer overflow vulnerability in AOLMediaPlaybackControl.exe from being reached. If you are unable to apply an update, please consider the following workarounds.
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
|Date First Published:||2008-01-09|
|Date Last Updated:||2008-01-31 20:33 UTC|