| VID |
28099 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The WinAMP program, according to its version number, has a remote buffer overflow vulnerability. Winamp is a media player for Microsoft Windows. Winamp version 5.05 and possibly earlier versions are vulnerable to a stack-based buffer overflow, caused by a failure of the application to properly check bounds of user-supplied input in the "IN_CDDA.dll" file. An attacker could exploit these vulnerabilities by creating a malicious Web page containing a specially crafted ".m3u" playlist and hosting it on a Web site or by sending it to a victim as an HTML email. If successfully exploited, an attacker could overflow a buffer and execute arbitrary code on the system.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://archives.neohapsis.com/archives/bugtraq/2004-11/0369.html http://secunia.com/advisories/13269/ http://www.security-assessment.com/Papers/Winamp_IN_CDDA_Buffer_Overflow.pdf http://www.securiteam.com/windowsntfocus/6H00M15BPU.html http://www.securiteam.com/exploits/6X00L1FBPW.html
* Platforms Affected: Nullsoft, Inc., Winamp 5.05 Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of Winamp (5.06 or later), available from the Winamp Player Download Web page at http://www.winamp.com/player/ |
| Related URL |
(CVE) |
| Related URL |
11730 (SecurityFocus) |
| Related URL |
18197 (ISS) |
|