Winamp < 5.623 Multiple Integer Overflows

High Nessus Plugin ID 57363

Synopsis

The remote Windows host contains a multimedia application that is affected by multiple integer overflow vulnerabilities.

Description

The remote host is running Winamp, a media player for Windows.

The version of Winamp installed on the remote host is earlier than 5.623 and thus is reportedly affected by the following integer overflow vulnerabilities :

- An integer-overflow vulnerability exists in 'in_avi.dll' when allocating memory using the number of stream headers. An attacker can trigger a heap overflow by enticing an unsuspecting user to open a specially crafted AVI file.

- An integer-overflow vulnerability exists in 'in_avi.dll' when parsing the 'RIFF INFO' chunk included in an AVI file. An attacker can exploit this issue by enticing an unsuspecting victim to open a specially crafted AVI file.

- An integer-overflow vulnerability exists in 'in_avi.dll' when parsing song message data included in an Impulse Tracker (IT) file. Successful exploits will allow arbitrary code to run in the context of the application.
Failed attacks will cause denial of service conditions.

Solution

Upgrade to Winamp 5.623 (5.6.2.3199) or later.

See Also

http://secunia.com/secunia_research/2011-81/

http://forums.winamp.com/showthread.php?t=332010

Plugin Details

Severity: High

ID: 57363

File Name: winamp_5623.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 2011/12/21

Modified: 2018/08/06

Dependencies: 15817

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:nullsoft:winamp

Required KB Items: SMB/Winamp/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/09/12

Vulnerability Publication Date: 2011/09/12

Reference Information

CVE: CVE-2011-3834

BID: 51015