AOL Radio AmpX ActiveX Control Buffer Overflow Vulnerabilities

High Nessus Plugin ID 27854


The remote Windows host has an ActiveX control that is affected by buffer overflow vulnerabilities.


The remote host contains the 'AmpX' ActiveX control, which is associated with AOL Radio.

The version of this control installed on the remote host fails to validate input to several methods before copying it into a finite- sized buffer using 'strcpy()'.

In addition, it allows remote access to the application 'AOLMediaPlaybackControl', which contains a stack-based buffer overflow.

If a remote attacker can trick a user on the affected host into visiting a specially crafted web page, these issues could be leveraged to overflow a buffer, either in the control itself or in AOLMediaPlaybackControl.exe, and execute arbitrary code on the host subject to the user's privileges.


Apply the AOL AmpX Security Update (unagi_patch.exe) referenced above to upgrade the affected control to version or later.

See Also

Plugin Details

Severity: High

ID: 27854

File Name: aol_ampx_activex_overflows.nasl

Version: $Revision: 1.22 $

Type: local

Agent: windows

Family: Windows

Published: 2007/11/10

Modified: 2016/10/07

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:W/RC:C

Vulnerability Information

CPE: cpe:/a:aol:radio, cpe:/a:aol:aolmediaplaybackcontrol

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2007/11/09

Reference Information

CVE: CVE-2007-5755, CVE-2007-6250

BID: 26396, 27207

OSVDB: 38705, 40199

CERT: 568681

CWE: 119