Winamp 5.12 - ZERO Day Exploit for unpatched vulnerability

Started by Corrine, January 31, 2006, 12:18:32 AM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

Corrine

Winamp Computer Name Handling Buffer Overflow Vulnerability
http://secunia.com/advisories/18649/

DESCRIPTION: The vulnerability is caused due to a boundary error during the handling of filenames including a computer name. This can be exploited to cause a buffer overflow via a specially crafted playlist containing a filename starting with an overly long computer name (about 1040 bytes).  Successful exploitation allows execution of arbitrary code on a user's system when e.g. a malicious website is visited. The vulnerability has been confirmed in version 5.12. Other versions may also be affected.

Affected Products: Nullsoft Winamp version 5.12 and prior

Solution: The FrSIRT is not aware of any official supplied patch for this issue.

Recommendation: Use Winamp for offline media only or access only highly trusted sites until a patch is issued.  It is likely that Nullsoft will quickly supply a patch, but until then use Winamp cautiously.

Complete report


Take a walk through the "Security Garden" -- Where Everything is Coming up Roses!

Remember - A day without laughter is a day wasted.
May the wind sing to you and the sun rise in your heart.

Corrine

Great response time!  Winamp 5.13 has been released.  Please update if you use Winamp.  http://www.winamp.com/player/


Take a walk through the "Security Garden" -- Where Everything is Coming up Roses!

Remember - A day without laughter is a day wasted.
May the wind sing to you and the sun rise in your heart.