Winamp flaw allows execution of arbitrary code

Posted on Monday, January 30 2006 @ 20:39 CET by Thomas De Maesschalck
Security firm Secunia reports about an extremely critical flaw in Winamp that allows the execution of arbitrary code. This flaw was found in Winamp 5.12 and likely affects older versions too.
ATmaCA has discovered a vulnerability in Winamp, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error during the handling of filenames including a computer name. This can be exploited to cause a buffer overflow via a specially crafted playlist containing a filename starting with an overly long computer name (about 1040 bytes). Successful exploitation allows execution of arbitrary code on a user's system when e.g. a malicious website is visited.
A patch can be found here.


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments