US-CERT Technical Cyber Security Alert TA06-032A -- Winamp Playlist Buffer Overflow

02/02/06, US-CERT Technical Cyber Security Alert TA06-032A -- Winamp Playlist Buffer Overflow
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: US-CERT Technical Cyber Security Alert TA06-032A -- Winamp Playlist Buffer Overflow
From: CERT Advisory <cert-advisory@cert.org>
Date: Wed, 1 Feb 2006 14:54:39 -0500
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


                        National Cyber Alert System

                Technical Cyber Security Alert TA06-032A


Winamp Playlist Buffer Overflow

   Original release date: February 1, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

   Microsoft Windows systems with Winamp 5.12 or earlier


Overview

   America Online has released Winamp 5.13 to correct a buffer overflow
   vulnerability. Exploitation of this vulnerability could allow a remote
   attacker to execute arbitrary code with the privileges of the user.


I. Description

   Winamp is a media player that is commonly used to play MP3 files.
   Winamp 5.13 resolves a buffer overflow vulnerability in how playlist
   files are handled. Details are available in the following
   Vulnerability Note:

   VU#604745 - Winamp fails to properly handle playlists with long
   computer names

   Winamp contains a buffer overflow vulnerability when processing a
   playlist that specifies a long computer name. This may allow a remote
   unauthenticated attacker to execute arbitrary code on a vulnerable
   system.


II. Impact

   By convincing a user to open a specially crafted playlist file, a
   remote unauthenticated attacker may be able to execute arbitrary code
   with the privileges of the user. Winamp may open a playlist file
   without any user interaction as the result of viewing a web page or
   other HTML document.


III. Solution

Upgrade

   Upgrade to Winamp 5.13.


Appendix A. References

     * US-CERT Vulnerability Note VU#604745 -
       <http://www.kb.cert.org/vuls/id/604745>
     * CVE-2006-0476 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0476>
     * National Vulnerability Database (CVE-2006-0476) -
       <http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-0476>
     * WINAMP.COM | Player | Version History -
       <http://www.winamp.com/player/version_history.php>
     * WINAMP.COM | Player - <http://www.winamp.com/player>


 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-032A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA06-032A Feedback VU#604745" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2006 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   Feb 1, 2006: Initial release






-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBQ+EN2H0pj593lg50AQL/zQgAqqNNsBwOLdKKb+e98yUUPRSyj38BKA1G
R4nBJ3mO85BvFFqS9NdcPSYH1DgELKhYwOoicEsbX0bmaF+lmr2ClHBO4af6fA3/
bhLksKmf5qtm61SSIuEVyBsXsDwSFQpLACOAkgarW5D5Ii4bW3CDlc9H/4dHYT3j
jiGMSVBmYWGjyEMEVznZ1liURyK6BpVHGQI0bf2/dhSk3150LJzwa0vACjnCJEeB
0Fs/s7xkAPoGDT4PxWxe/KEK03PZpJY6yZhCP6IayJsuO7kMQhzBoROK615X/Od5
ctU6qLPx8VIcyW7b9xVMl0OuZf7R412qd74bmnDfIYeGexxuLMifFg==
=NZIe
-----END PGP SIGNATURE-----

Previous message sorted by date: US-CERT Technical Cyber Security Alert TA06-018A -- Oracle Products Contain Multiple Vulnerabilities
Next message sorted by date: US-CERT Technical Cyber Security Alert TA06-038A -- Multiple Vulnerabilities in Mozilla Products
Previous message sorted by thread: US-CERT Technical Cyber Security Alert TA06-018A -- Oracle Products Contain Multiple Vulnerabilities
Next message by thread: US-CERT Technical Cyber Security Alert TA06-038A -- Multiple Vulnerabilities in Mozilla Products
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Feb 2006