Korean
<< Back
VID 28099
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The WinAMP program, according to its version number, has a remote buffer overflow vulnerability.
Winamp is a media player for Microsoft Windows. Winamp version 5.05 and possibly earlier versions are vulnerable to a stack-based buffer overflow, caused by a failure of the application to properly check bounds of user-supplied input in the "IN_CDDA.dll" file. An attacker could exploit these vulnerabilities by creating a malicious Web page containing a specially crafted ".m3u" playlist and hosting it on a Web site or by sending it to a victim as an HTML email. If successfully exploited, an attacker could overflow a buffer and execute arbitrary code on the system.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://archives.neohapsis.com/archives/bugtraq/2004-11/0369.html
http://secunia.com/advisories/13269/
http://www.security-assessment.com/Papers/Winamp_IN_CDDA_Buffer_Overflow.pdf
http://www.securiteam.com/windowsntfocus/6H00M15BPU.html
http://www.securiteam.com/exploits/6X00L1FBPW.html

* Platforms Affected:
Nullsoft, Inc., Winamp 5.05
Microsoft Windows Any version
Recommendation Upgrade to the latest version of Winamp (5.06 or later), available from the Winamp Player Download Web page at http://www.winamp.com/player/
Related URL (CVE)
Related URL 11730 (SecurityFocus)
Related URL 18197 (ISS)