Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2013/Jul/4 | mailing list exploit |
http://www.exploit-db.com/exploits/26558 | exploit |
http://forums.winamp.com/showthread.php?t=364291 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85399 | vdb entry |
http://osvdb.org/94739 | vdb entry |
http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html | exploit |
http://osvdb.org/94740 | vdb entry |
https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 | exploit |
http://www.securitytracker.com/id/1030107 | vdb entry |
http://packetstormsecurity.com/files/122978 | exploit |
http://www.securityfocus.com/bid/60883 | vdb entry exploit |