AOL.YGPPicEdit.DLL.ActiveX.Control.Buffer.Overflow
Description
This indicates an attack attempt to exploit a memory corruption vulnerability in AOL Picture Editor.
The vulnerability is located in the "YGPPicEdit.dll" ActiveX control through misuse of the following methods: AppContext, Cookie, CropDimensions, DisplayName, FinalSavePath, ForceSaveTo, HiddenControls, and InitialEditorScreen. It may allow remote attackers to execute arbitrary code in the context of the application using the affected ActiveX control. Failed exploit attempts will likely cause the program to crash, resulting in a denial of service condition.
Affected Products
YGPPicEdit.dll version 1.0.12.15
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Set kill bit for {E0CB08CE-AB3D-4779-9C77-62A439BFE6C3}.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-01-11 | 16.995 |