|
Family: Windows --> Category: infos
AOL You've Got Pictures ActiveX Control Overflow Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for overflow vulnerability in AOL You've Got Pictures ActiveX control
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote Windows host has an ActiveX control that is affected by a
buffer overflow vulnerability.
Description :
The remote host contains an ActiveX control from AOL called YPG
Picture Finder Tool. It was distributed along with various versions
of AOL's client software and from the You've Got Pictures web site
prior to 2004. The 'YGPPicFinder.DLL' component of this control fails
to limit the amount of user-supplied data copied to a finite buffer.
This can be exploited using, say, a specially-crafted web page to
overflow the buffer, crash the application using the control
(typically Internet Explorer), and possibly execute arbitrary code
subject to the user's rights.
See also :
http://www.kb.cert.org/vuls/id/715730
http://download.newaol.com/security/YGPClean.exe
Solution :
Download and run AOL's removal tool.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|