IRM 018: Winamp 5.13 m3u Playlist Buffer Overflow

2006.02.26
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-Other


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

IRM Security Advisory No. 018 Winamp 5.13 m3u Playlist Buffer Overflow Vulnerability Type / Importance: Unauthorised Code Execution / High Problem Discovered: February 17th 2006 Vendor Contacted: February 17th 2006 Advisory Published: February 24th 2006 Abstract: Nullsoft Winamp is a popular media player available for multiple platforms. Description: A buffer overflow exists in Winamp's handling of a m3u playlist file. Technical Details: Winamp 5.13 and earlier is susceptible to a buffer overflow condition when a specially crafted playlist filename (m3u or pls) is embedded within another m3u playlist. Vendor & Patch Information: Nullsoft were contacted and have confirmed this as a new vulnerability. They have addressed this along with other vulnerabilities in the new release of Winamp 5.2 (http://www.winamp.com/player/version_history.php). It is recommended that user's upgrade to the new version of winamp as soon as possible. Tested Versions: Winamp 5.13 Credits: Research & Advisory: P Robinson Disclaimer: All information in this advisory is provided on an 'as is' basis in the hope that it will be useful. Information Risk Management Plc is not responsible for any risks or occurrences caused by the application of this information. About IRM: IRM is a product independent information security consultancy based in the UK, Hong Kong, Spain and Dubai. http://www.irmplc.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top