Winamp < 5.22 Malformed Midi File Handling Buffer Overflow

High Nessus Plugin ID 21733


The remote Windows host contains a multimedia application that is prone to a buffer overflow attack.


The remote host is using Winamp, a popular media player for Windows.

The version of Winamp installed on the remote Windows host reportedly contains a buffer overflow in the 'in_midi.dll' library that can be exploited using a specially crafted MIDI file to either crash the affected application or possibly even execute arbitrary code remotely, subject to the privileges of the user running the application.


Upgrade to Winamp version 5.22 or later.

See Also

Plugin Details

Severity: High

ID: 21733

File Name: winamp_522.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2006/06/20

Modified: 2011/10/06

Dependencies: 15817

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:nullsoft:winamp

Required KB Items: SMB/Winamp/Version

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/05/25

Reference Information

CVE: CVE-2006-3228

BID: 18507

OSVDB: 26727