Winamp < 5.601 MIDI Timestamp Stack-based Buffer Overflow

high Nessus Plugin ID 51091

Language:

Synopsis

The remote Windows host contains a multimedia application that is affected by stack-based buffer overflow vulnerability.

Description

The remote host is running Winamp, a media player for Windows.

The version of Winamp installed on the remote host is earlier than 5.601. Such versions are potentially affected by a stack-based buffer overflow vulnerability due to an error in the 'in_midi.ddl' plugin that improperly serializes timestamps in MIDI files. A malicious, crafted MIDI file can cause the application to overwrite the saved base pointer and allow execution of arbitrary code.

Solution

Upgrade to Winamp 5.601 or later.

See Also

https://www.kryptoslogic.com/advisories/2010/kryptoslogic-winamp-midi.txt

http://forums.winamp.com/showthread.php?s=&threadid=159785

Plugin Details

Severity: High

ID: 51091

File Name: winamp_5601.nasl

Version: 1.12

Type: local

Agent: windows

Family: Windows

Published: 12/9/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:nullsoft:winamp

Required KB Items: SMB/Winamp/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/7/2010

Vulnerability Publication Date: 12/7/2010

Reference Information

BID: 45221

SECUNIA: 42475