ActiveX Control Vulnerability in AOL Desktop Software
CVE-2010-10015
Key Information:
Badges
What is CVE-2010-10015?
The AOL Desktop Software, specifically versions 9.5 and earlier, contains a security vulnerability in the Phobos.dll ActiveX control. The Import() method of the Phobos.Playlist COM object is susceptible to a stack-based buffer overflow when it processes an overly long string argument. If exploited, this vulnerability could allow an attacker to execute arbitrary code in the context of the user, provided that the crafted HTML file is opened locally. It is crucial to note that this vulnerability arises because the ActiveX control is not designated safe for scripting or initialization. Although AOL remains active through services like AOL Mail, the affected software versions are no longer maintained or supported.
Affected Version(s)
AOL * <= 9.5 (Revision 4337.155)
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved