VID |
28158 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The WinAMP program, according to its version number, has buffer overflow flaws which exists in versions prior to 5.31. AOL Nullsoft Winamp is a freely available media player for Microsoft Windows platforms. Winamp versions prior to 5.31 are vulnerable to two buffer overflow vulnerabilities in the Ultravox protocol handler. A remote attacker could exploit these vulnerabilities by creating a specially-crafted 'shout:' or 'uvox:' URI, and enticing unsuspecting users to process the file. It might allow the attacker to execute arbitrary code on the affected system or possibly cause a denial of service.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.winamp.com/player/version_history.php http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=431 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=432 http://www.securityfocus.com/archive/1/449721/30/0/threaded http://www.securityfocus.com/archive/1/449722/30/0/threaded http://www.frsirt.com/english/advisories/2006/4196 http://secunia.com/advisories/22580/ http://www.kb.cert.org/vuls/id/449092
* Platforms Affected: Nullsoft Winamp versions prior to 5.31 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of winamp (5.31 or later), available from the Nullsoft Winamp Download Web page at http://www.winamp.com/player/ |
Related URL |
CVE-2006-5567 (CVE) |
Related URL |
20744 (SecurityFocus) |
Related URL |
29804,29807 (ISS) |
|