Winamp AVI / IT File Processing Vulnerabilities
RISK: Medium Risk
TYPE: Clients - Audio & Video
Multiple vulnerabilities have been identified in Winamp, which can be exploited by malicious people to compromise a user's system.
An integer overflow error in the in_avi.dll plugin when allocating memory using the number of streams header value can be exploited to cause a heap-based buffer overflow via a specially crafted AVI file.
An integer overflow error in the in_avi.dll plugin when allocating memory using the RIFF INFO chunk's size value can be exploited to cause a heap-based buffer overflow via a specially crafted AVI file.
An error in the in_mod.dll plugin when parsing the song message data within Impulse Tracker (IT) files can be exploited to cause a heap-based buffer overflow.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
Impact
- Remote Code Execution
System / Technologies affected
- Winamp 5.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 5.623.
Vulnerability Identifier
Source
Related Link
Share with