AOL You've Got Pictures ActiveX Control (YGPPicFinder.DLL) Overflow

critical Nessus Plugin ID 20737

Synopsis

The remote Windows host has an ActiveX control that is affected by a buffer overflow vulnerability.

Description

The remote host contains an ActiveX control from AOL called YPG Picture Finder Tool. It was distributed along with various versions of AOL's client software and from the You've Got Pictures website prior to 2004. The 'YGPPicFinder.DLL' component of this control fails to limit the amount of user-supplied data copied to a finite buffer. This can be exploited using a specially crafted web page, for example to overflow the buffer, crash the application using the control (typically Internet Explorer), and possibly execute arbitrary code subject to the user's privileges.

Solution

Download and run AOL's removal tool.

See Also

http://download.newaol.com/security/YGPClean.exe

Plugin Details

Severity: Critical

ID: 20737

File Name: ygp_activex_overflow.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 1/18/2006

Updated: 8/7/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:aol:aol_client_software

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/16/2006

Reference Information

CVE: CVE-2006-0316

BID: 16262

CERT: 715730