Korean
<< Back
VID 28128
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The WinAMP program, according to its version number, has a buffer overflow vulnerability via the playlist file name. Nullsoft Winamp is a freely available media player for Microsoft Windows platforms. Winamp version 5.12 and earlier versions are vulnerable to a buffer overflow vulnerability, caused by improper bounds checking of file names within a playlist. A remote attacker could exploit this vulnerability by sending a malicious .pls or .m3u file containing an overly long file name path, and enticing unsuspecting users to process them. It might allow the attacker to execute arbitrary code on the affected system or possibly cause a denial of service.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.kb.cert.org/vuls/id/604745
http://www.frsirt.com/english/advisories/2006/0361
http://www.frsirt.com/exploits/20060129.winamp0day.c.php
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=377
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=378
http://www.winamp.com/player/version_history.php
http://secunia.com/advisories/18649/
http://www.us-cert.gov/cas/techalerts/TA06-032A.html

* Platforms Affected:
Nullsoft Winamp version 5.12 and earlier versions
Microsoft Windows Any version
Recommendation Upgrade to the latest version of winamp (5.13 or later), available from the Nullsoft Winamp Download Web page at http://www.winamp.com/player/
Related URL CVE-2006-0476 (CVE)
Related URL 16410,16462 (SecurityFocus)
Related URL 24361 (ISS)