VID |
28132 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The WinAMP program, according to its version number, has multiple buffer overflows which exist in versions 5.13 and earlier. Nullsoft Winamp is a freely available media player for Microsoft Windows platforms. Winamp version 5.13 and earlier versions are vulnerable to multiple buffer overflow vulnerabilities via an .m3u file containing an overly long .wma or .mp3 URL, a .pls file containing a File1 field with an overly long .wma URL, an .m3u file with a long filename, and a crafted .m3u file that causes an incorrect strncpy function call when the player pauses or stops the file. A remote attacker could exploit these vulnerabilities by sending a specially-crafted .pls or .m3u file, and enticing unsuspecting users to process them. It might allow the attacker to execute arbitrary code on the affected system or possibly cause a denial of service.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://forums.winamp.com/showthread.php?threadid=238648 http://www.securityfocus.com/archive/1/424903/30/0/threaded http://www.securityfocus.com/archive/1/425888/30/0/threaded http://www.winamp.com/player/version_history.php http://archives.neohapsis.com/archives/bugtraq/2006-02/0189.html http://www.frsirt.com/english/advisories/2006/0613 http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042239.html http://secunia.com/advisories/18848/ http://secway.org/advisory/AD20060216.txt http://securitytracker.com/alerts/2006/Feb/1015621.html http://securitytracker.com/id?1015675
* Platforms Affected: Nullsoft Winamp version 5.13 and earlier versions Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of winamp (5.2 or later), available from the Nullsoft Winamp Download Web page at http://www.winamp.com/player/ |
Related URL |
CVE-2006-0708,CVE-2006-0720 (CVE) |
Related URL |
16623,16785 (SecurityFocus) |
Related URL |
24739,24740,24741 (ISS) |
|