Vulnerabilities > CVE-2009-3658 - Use After Free vulnerability in AOL Superbuddy Activex Control 9.5.0.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Use-after-free vulnerability in the Sb.SuperBuddy.1 ActiveX control (sb.dll) in America Online (AOL) 9.5.0.1 allows remote attackers to trigger memory corruption or possibly execute arbitrary code via a malformed argument to the SetSuperBuddy method.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | AOL 9.1 SuperBuddy ActiveX Control remote code execution. CVE-2009-3658. Remote exploit for windows platform |
id | EDB-ID:9992 |
last seen | 2016-02-01 |
modified | 2009-10-01 |
published | 2009-10-01 |
reporter | Trotzkista |
source | https://www.exploit-db.com/download/9992/ |
title | AOL 9.1 SuperBuddy ActiveX Control Remote code execution |
Oval
accepted | 2011-08-22T04:01:34.527-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | Use-after-free vulnerability in the Sb.SuperBuddy.1 ActiveX control (sb.dll) in America Online (AOL) 9.5.0.1 allows remote attackers to trigger memory corruption or possibly execute arbitrary code via a malformed argument to the SetSuperBuddy method. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:6704 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2009-11-25T18:28:46 | ||||||||||||
title | AOL SuperBuddy ActiveX Control Remote Code Execution Vulnerability. | ||||||||||||
version | 24 |
References
- http://www.vupen.com/english/advisories/2009/2812
- http://secunia.com/advisories/36919
- http://retrogod.altervista.org/9sg_aol_91_superbuddy.html
- http://www.securityfocus.com/bid/36580
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53614
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6704
- http://www.securityfocus.com/archive/1/506889/100/0/threaded