CVE-2011-10027
Severity CVSS v4.0:
HIGH
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
20/08/2025
Last modified:
22/08/2025
Description
AOL Desktop 9.6 contains a buffer overflow vulnerability in its Tool\rich.rct component when parsing .rtx files. By embedding an overly long string in a hyperlink tag, an attacker can trigger a stack-based buffer overflow due to the use of unsafe strcpy operations. This allows remote attackers to execute arbitrary code when a victim opens a malicious .rtx file. AOL Desktop is end-of-life and no longer supported. Users are encouraged to migrate to AOL Desktop Gold or alternative platforms.
Impact
Base Score 4.0
8.40
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/aol_desktop_linktag.rb
- https://www.exploit-db.com/exploits/16085
- https://www.exploit-db.com/exploits/16107
- https://www.exploit-db.com/exploits/17150
- https://www.fortiguard.com/encyclopedia/ips/26516
- https://www.vulncheck.com/advisories/aol-desktop-rtx-stack-based-buffer-overflow



