| VID |
28105 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The WinAMP program, according to its version number, has a buffer overflow vulnerability in the .WSZ Winamp skin file. Nullsoft Winamp is a freely available media player for Microsoft Windows platforms. Winamp versions prior to 5.05 could allow remote attackers to execute arbitrary code on client computers through a malicious .WSZ Winamp skin file. A remote attacker could exploit this vulnerability by sending malicious files and enticing unsuspecting users to process them. It might allow the attacker to execute arbitrary code on the affected system or possibly cause a denial of service.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.winamp.com/about/article.php?aid=10605 http://secunia.com/advisories/12381/ http://www.k-otik.com/exploits/08252004.skinhead.php http://packetstormsecurity.nl/0408-exploits/winampExploit.txt
* Platforms Affected: Nullsoft, Inc., Winamp 3.0 Nullsoft, Inc., Winamp 5.0 through 5.04 Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of winamp (5.05 or later), available from the Nullsoft Winamp Download Web page at http://www.winamp.com/player/ |
| Related URL |
CVE-2004-0820 (CVE) |
| Related URL |
11053 (SecurityFocus) |
| Related URL |
17124 (ISS) |
|