AOL Patches Critical Browser Bug

Attackers would need to dupe users into visiting a malicious Web site to exploit the vulnerability.

Gregg Keizer, Contributor

October 26, 2006

1 Min Read

An ActiveX control shipped with AOL's Web access software can be used by attackers to hijack users' PCs, security companies said Thursday. AOL has released a fix, and urged users to log on to obtain it.

According to Reston, Va.-based iDefense Labs, America Online 9.0 Security Edition -- which is based on Microsoft's Internet Explorer 6.0 browser -- uses an ActiveX control dubbed "YGPPDownload" that can be exploited using two separate flaws in the control's code.

"This control is registered as safe for scripting in IE and contains a buffer overflow," read the iDefense alerts. "Exploitation of this vulnerability is trivial and allows for arbitrary execution of code as the currently logged in user."

Attackers would need to dupe users into visiting a malicious Web site to exploit the two vulnerabilities.

Danish vulnerability tracker Secunia collectively pegged the bugs with a "Highly critical" rating, its second-from-the-top rank.

AOL subscribers using 9.0 Security Edition or 9.0 should log on, said iDefense, to automatically obtain a fix for the flaws. Users relying on older versions of the AOL software should instead update to the newest edition of 9.0 Security.

Both of the vulnerabilities reported by iDefense were discovered by researchers rewarded by the company's Vulnerability Contributor Program, a bug bounty scheme that has been in operation since 2005.

About the Author(s)

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like

More Insights