Lucene search

K

AOL Radio AmpX ActiveX Control Buffer Overflow Vulnerabilities

πŸ—“οΈΒ 10 Nov 2007Β 00:00:00Reported byΒ This script is Copyright (C) 2007-2022 Tenable Network Security, Inc.TypeΒ 
nessus
Β nessus
πŸ”—Β www.tenable.comπŸ‘Β 41Β Views

The 'AmpX' ActiveX control in AOL Radio and AOLMediaPlaybackControl are vulnerable to buffer overflow attacks

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
NVD
CVE-2007-6250
9 Jan 200823:46
–nvd
NVD
CVE-2007-5755
14 Nov 200701:46
–nvd
seebug.org
AOL Radio MediaPlaybackControl.exe AmpX ActiveXζŽ§δ»Άζ ˆζΊ’ε‡ΊζΌζ΄ž
12 Jan 200800:00
–seebug
CVE
CVE-2007-6250
9 Jan 200823:46
–cve
CVE
CVE-2007-5755
14 Nov 200701:46
–cve
CERT
AOL Radio AOLMediaPlaybackControl.exe stack buffer overflow
9 Jan 200800:00
–cert
Cvelist
CVE-2007-6250
9 Jan 200823:00
–cvelist
Cvelist
CVE-2007-5755
14 Nov 200701:00
–cvelist
securityvulns
iDefense Security Advisory 11.09.07: AOL AmpX ActiveX Control Multiple Buffer Overflow Vulnerabilities
12 Nov 200700:00
–securityvulns
securityvulns
AOL Radio AmpX Active X buffer overflow
12 Nov 200700:00
–securityvulns
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(27854);
  script_version("1.25");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2007-5755", "CVE-2007-6250");
  script_bugtraq_id(26396, 27207);
  script_xref(name:"CERT", value:"568681");

  script_name(english:"AOL Radio AmpX ActiveX Control Buffer Overflow Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an ActiveX control that is affected by
buffer overflow vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote host contains the 'AmpX' ActiveX control, which is
associated with AOL Radio.

The version of this control installed on the remote host fails to
validate input to several methods before copying it into a finite-
sized buffer using 'strcpy()'.

In addition, it allows remote access to the application
'AOLMediaPlaybackControl', which contains a stack-based buffer
overflow.

If a remote attacker can trick a user on the affected host into visiting
a specially crafted web page, these issues could be leveraged to
overflow a buffer, either in the control itself or in
AOLMediaPlaybackControl.exe, and execute arbitrary code on the host
subject to the user's privileges.");
  # https://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php?id=623
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b098a46c");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2007/Nov/234");
  script_set_attribute(attribute:"see_also", value:"http://radaol-prod-web-rr.streamops.aol.com/mediaplugin/unagi_patch.exe");
  script_set_attribute(attribute:"solution", value:
"Apply the AOL AmpX Security Update (unagi_patch.exe) referenced above
to upgrade the affected control to version 2.6.2.6 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(119);

  script_set_attribute(attribute:"vuln_publication_date", value:"2007/11/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/11/10");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:aol:radio");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:aol:aolmediaplaybackcontrol");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2007-2022 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


include("global_settings.inc");
include("smb_func.inc");
include("smb_activex_func.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);


# Locate files used by the control.
if (activex_init() != ACX_OK) exit(0);

info = "";
clsids = make_list(
  "{B49C4597-8721-4789-9250-315DFBD9F525}",
  "{FA3662C3-B8E8-11D6-A667-0010B556D978}"
);

foreach clsid (clsids)
{
  file = activex_get_filename(clsid:clsid);
  if (file)
  {
    # Check its version.
    ver = activex_get_fileversion(clsid:clsid);
    if (ver && activex_check_fileversion(clsid:clsid, fix:"2.6.2.6") == TRUE)
    {
      if (report_paranoia > 1 || activex_get_killbit(clsid:clsid) == 0)
      {
        info += '  - ' + clsid + '\n' + 
                '    ' + file + ', ' + ver + '\n';

        if (!thorough_tests) break;
      }
    }
  }
}
activex_end();


if (info)
{
  info = string(
    "Nessus found vulnerable control(s) installed as :\n",
    "\n",
    info
  );

  if (!thorough_tests)
  {
    info = string(
      info,
      "\n",
      "Note that Nessus did not check whether there were other instances\n",
      "installed because the 'Perform thorough tests' setting was not enabled\n",
      "when this scan was run.\n"
    );
  }

  if (report_paranoia > 1)
    info = string(
      info,
      "\n",
      "Note that Nessus did not check whether the kill bit was set for\n",
      "the control(s) because of the Report Paranoia setting in effect\n",
      "when this scan was run.\n"
    );
  else 
    info = string(
      info,
      "\n",
      "Moreover, the kill bit was not set for the control(s) so they\n",
      "are accessible via Internet Explorer.\n"
    );
  security_hole(port:kb_smb_transport(), extra:info);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
10 Nov 2007 00:00Current
7.5High risk
Vulners AI Score7.5
CVSS29.3
EPSS0.441
41
.json
Report