Nullsoft Winamp before 5.24 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15225 | vdb entry third party advisory signature |
http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf | third party advisory |
http://securitytracker.com/id?1020582 | vdb entry third party advisory |
http://www.infobyte.com.ar/down/isr-evilgrade-1.0.0.tar.gz | third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html | mailing list broken link |