Skip to main content

Winamp AVI / IT File Processing Vulnerabilities

Last Update Date: 13 Dec 2011 11:37 Release Date: 13 Dec 2011 5420 Views

RISK: Medium Risk

TYPE: Clients - Audio & Video

TYPE: Audio & Video

Multiple vulnerabilities have been identified in Winamp, which can be exploited by malicious people to compromise a user's system.

  1. An integer overflow error in the in_avi.dll plugin when allocating memory using the number of streams header value can be exploited to cause a heap-based buffer overflow via a specially crafted AVI file.

  2. An integer overflow error in the in_avi.dll plugin when allocating memory using the RIFF INFO chunk's size value can be exploited to cause a heap-based buffer overflow via a specially crafted AVI file.

  3. An error in the in_mod.dll plugin when parsing the song message data within Impulse Tracker (IT) files can be exploited to cause a heap-based buffer overflow.
    Successful exploitation of the vulnerabilities may allow execution of arbitrary code.


Impact

  • Remote Code Execution

System / Technologies affected

  • Winamp 5.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 5.623.

Vulnerability Identifier


Source


Related Link