Winamp 5.56 PNG / JPEG data related integer overflows.

2009-12-18 / 2009-12-19
Credit: VUPEN
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

VUPEN Security Research - Winamp PNG and JPEG Data Integer Overflow Vulnerabilities http://www.vupen.com/english/research.php I. BACKGROUND --------------------- Winamp is a proprietary media player written by Nullsoft, now a subsidiary of AOL. It is skinnable, multi-format freeware/shareware (from Wikipedia). Winamp is a one of the world's most popular media players with over 73 million users globally (comScore Media Metrix, January 2009). II. DESCRIPTION --------------------- VUPEN Vulnerability Research Team discovered critical vulnerabilities affecting Winamp. These vulnerabilities are caused due to integer overflow errors within the "jpeg.w5s" and "png.w5s" filters when processing malformed JPEG or PNG data in a media (e.g. MP3) file, which could allow attackers to execute arbitrary code by tricking a user into opening a specially crafted MP3. III. AFFECTED PRODUCTS -------------------------------- Winamp version 5.56 and prior IV. Exploits - PoCs & Binary Analysis ---------------------------------------- In-depth binary analysis of the vulnerabilities and proof-of-concept codes have been released by VUPEN Security through the VUPEN Exploits & PoCs Service : http://www.vupen.com/exploits V. SOLUTION ---------------- Upgrade to Winamp version 5.57 : http://www.winamp.com/media-player VI. CREDIT -------------- The vulnerabilities were discovered by Nicolas JOLY of VUPEN Security VII. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2009/3576 http://forums.winamp.com/showthread.php?threadid=315355 VIII. DISCLOSURE TIMELINE ----------------------------------- 2009-11-25 - Vendor notified 2009-11-25 - Vendor response 2009-12-02 - Status update received 2009-12-17 - Coordinated public Disclosure

References:

http://forums.winamp.com/showthread.php?threadid=315355
http://www.vupen.com/english/advisories/2009/3576


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top