Korean
<< Back
VID 28040
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Windows system has the version of WinAMP that is vulnerable to a buffer overflow vulnerability.
WinAMP, developed by Nullsoft.Inc, is the most popular free software that acts as a media player for the Microsoft Windows platform. The version 3.0 and earlier is vulnerable to a buffer overflow attack due to overly long playlist name. This vulnerability arises due to a lack of checking bound of the buffer for the playlist name in a b4s file that is used for WinAMP to save user's mp3 list. When a remote attacker can create a malformed .b4s file with excessively long playlist name and then send it to the target system through E-Mail or hosting it on the Web page, it will causes the buffer in the WinAMP to be overrun and the WinAMP to be unstable if user double-click it. Using this vulnerability, a remote attacker can the WinAMP to be crashed and potentially execute arbitrary code on the system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://archives.neohapsis.com/archives/bugtraq/2003-01/0025.html

* Softwares Affected:
WinAMP 3.0 build 488 and earlier
Recommendation No the Patch appropriately as of April, 2003. Contact with your product vendor.
Related URL (CVE)
Related URL 6515 (SecurityFocus)
Related URL 10980 (ISS)