Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for overflow vulnerability in AOL You've Got Pictures ActiveX control
Detailed Explanation for this Vulnerability Assessment
The remote Windows host has an ActiveX control that is affected by a
buffer overflow vulnerability.
The remote host contains an ActiveX control from AOL called YPG
Picture Finder Tool. It was distributed along with various versions
of AOL's client software and from the You've Got Pictures web site
prior to 2004. The 'YGPPicFinder.DLL' component of this control fails
to limit the amount of user-supplied data copied to a finite buffer.
This can be exploited using, say, a specially-crafted web page to
overflow the buffer, crash the application using the control
(typically Internet Explorer), and possibly execute arbitrary code
subject to the user's rights.
See also :
Download and run AOL's removal tool.
Network Security Threat Level:
High / CVSS Base Score : 7.0
Networks Security ID: 16262
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|HPE HP DL380 G9 Gen9 SERVER E5-2698V4 2.2GHZ 128GB 8 X 300GB 10K
|HPE HP DL380 G9 Gen9 SERVER E5-2690V3 2.6GHZ 256GB 8 X 1.6TB SSD
No Discussions have been posted on this vulnerability.