what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WinAmp 5.63 Buffer Overflow

WinAmp 5.63 Buffer Overflow
Posted Jul 1, 2013
Authored by Julien Ahrens | Site security.inshell.net

WinAmp version 5.63 suffers from a stack-based buffer overflow vulnerability. The application loads the directories in %PROGRAMFILES%\WinAmp\Skins on startup to determine the skins that have been installed and to list them in the application menu point "Skins" and in the Skins Browser. But the application does not properly validate the length of the directory name before passing it as argument to a lstrcpynW call in the library gen_jumpex.dll, which leads to a buffer overflow condition with possible code execution.

tags | exploit, overflow, code execution
advisories | CVE-2013-4694
SHA-256 | a76ea933b9df26a37cc6888564494cffff7f2cecd9238e9b31fca155cae86ed4

WinAmp 5.63 Buffer Overflow

Change Mirror Download
Inshell Security Advisory
http://www.inshell.net


1. ADVISORY INFORMATION
-----------------------
Product: WinAmp
Vendor URL: www.winamp.com
Type: Stack-based Buffer Overflow [CWE-121]
Date found: 2013-06-05
Date published: 2013-07-01
CVSSv2 Score: Bug #1: 7,5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Bug #2: 3,7 (AV:L/AC:H/Au:N/C:P/I:P/A:P)
CVE: CVE-2013-4694


2. CREDITS
----------
These vulnerabilities were discovered and researched by Julien Ahrens
from Inshell Security.


3. VERSIONS AFFECTED
--------------------
WinAmp v5.63, older versions may be affected too.


4. VULNERABILITY DESCRIPTION (BUG #1)
-------------------------------------
The application loads the directories in %PROGRAMFILES%\WinAmp\Skins on
startup to determine the skins that have been installed and to list them
in the application menu point "Skins" and in the Skins Browser. But the
application does not properly validate the length of the directory name
before passing it as argument to a lstrcpynW call in the library
gen_jumpex.dll, which leads to a buffer overflow condition with possible
code execution.

This flaw is also exploitable via the %APPDATA%\WinAmp\winamp.ini. The
application loads the contents on startup, but does not properly
validate the length of the string loaded from the "skin" key before
passing it as an argument to the same lstrcpynW call in the library
gen_jumpex.dll, which leads to the same buffer overflow condition.

An attacker either needs to trick the victim to download and apply an
arbitrary skin package in order to exploit the vulnerability or to copy
an arbitrary winamp.ini into the %APPDATA%\WinAmp directory. Successful
exploits can allow attackers to execute arbitrary code with the
privileges of the user running the application. Failed exploits will
result in a denial-of-service condition.


4. VULNERABILITY DESCRIPTION (BUG #2)
-------------------------------------
The application loads the string of the GUI "Search" field from the
"WinAmp Library" when entered by a user and after switching to another
menu point, but does not properly validate the length of the string
before passing it as an argument to a GetDlgItemTextW call in the
library ml_local.dll, which leads to a buffer overflow condition with
possible code execution.

An attacker needs local access to the client in order to exploit the
vulnerability. Successful exploits can allow attackers to execute
arbitrary code with the privileges of the user running the application.
Failed exploits will result in a denial-of-service condition.


5. PROOF-OF-CONCEPT (DEBUG) (Bug #1)
------------------------------------
Registers:
EAX 3B3C08EB
ECX 7C80BAFC kernel32.7C80BAFC
EDX 00430010 winamp.00430010
EBX 0000007E
ESP 00C1F290 UNICODE "CCCCCCCCCCCCCCCCCCCCCCCCCCCC"
EBP 00430043 winamp.00430043
ESI 001961E8
EDI 0000060B
EIP 00430060 winamp.00430060
C 0 ES 0023 32bit 0(FFFFFFFF)
P 1 CS 001B 32bit 0(FFFFFFFF)
A 0 SS 0023 32bit 0(FFFFFFFF)
Z 1 DS 0023 32bit 0(FFFFFFFF)
S 0 FS 003B 32bit 7FFDE000(FFF)
T 0 GS 0000 NULL
D 0
O 0 LastErr ERROR_INVALID_WINDOW_HANDLE (00000578)
EFL 00010246 (NO,NB,E,BE,NS,PE,GE,LE)
ST0 empty +NaN
ST1 empty
ST2 empty
ST3 empty
ST4 empty
ST5 empty
ST6 empty
ST7 empty
3 2 1 0 E S P U O Z D I
FST 0120 Cond 0 0 0 1 Err 0 0 1 0 0 0 0 0 (LT)
FCW 027F Prec NEAR,53 Mask 1 1 1 1 1 1

Stackview:
ESP-20 > 00430043 CC winamp.00430043
ESP-1C > 0043004B KC winamp.0043004B
ESP-18 > 7C80BAFC kernel32.7C80BAFC
ESP-14 > 00430043 CC winamp.00430043
ESP-10 > 00430043 CC winamp.00430043
ESP-C > 00430043 CC winamp.00430043
ESP-8 > 00430043 CC winamp.00430043
ESP-4 > 00430043 CC winamp.00430043
ESP ==> > 00430043 CC winamp.00430043
ESP+4 > 00430043 CC winamp.00430043
ESP+8 > 00430043 CC winamp.00430043
ESP+C > 00430043 CC winamp.00430043
ESP+10 > 00430043 CC winamp.00430043
ESP+14 > 00430043 CC winamp.00430043
ESP+18 > 00430043 CC winamp.00430043
ESP+1C > 00430043 CC winamp.00430043
ESP+20 > 00430043 CC winamp.00430043

Vulnerable code part:
.text:1001A5B8 push eax ; lpString2
.text:1001A5B9 lea eax, [ebp+String1]
.text:1001A5BF push eax ; lpString1
.text:1001A5C0 call ds:lstrcpynW
.text:1001A5C6 cmp word ptr [ebp+wParam], si
.text:1001A5CD jnz short loc_1001A5E2
.text:1001A5CF mov dword_100310B4, 1
.text:1001A5D9 cmp [ebp+String1], si
.text:1001A5E0 jz short loc_1001A5E8
.text:1001A5E2
.text:1001A5E2 loc_1001A5E2: ; CODE XREF:
sub_1001A551+7Cj
.text:1001A5E2 mov dword_100310B4, esi
.text:1001A5E8
.text:1001A5E8 loc_1001A5E8: ; CODE XREF:
sub_1001A551+8Fj
.text:1001A5E8 pop esi
.text:1001A5E9 leave
.text:1001A5EA retn
.text:1001A5EA sub_1001A551 endp


5. PROOF-OF-CONCEPT (DEBUG) (Bug #2)
------------------------------------
Registers:
EAX 00000000
ECX 079A9D68 ml_local.079A9D68
EDX 00380608
EBX 00000000
ESP 00C1E46C UNICODE "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
EBP 00430043 winamp.00430043
ESI 00000000
EDI 00000000
EIP 00430043 winamp.00430043
C 0 ES 0023 32bit 0(FFFFFFFF)
P 1 CS 001B 32bit 0(FFFFFFFF)
A 0 SS 0023 32bit 0(FFFFFFFF)
Z 1 DS 0023 32bit 0(FFFFFFFF)
S 0 FS 003B 32bit 7FFDE000(FFF)
T 0 GS 0000 NULL
D 0
O 0 LastErr ERROR_INVALID_WINDOW_HANDLE (00000578)
EFL 00010246 (NO,NB,E,BE,NS,PE,GE,LE)
ST0 empty
ST1 empty
ST2 empty
ST3 empty
ST4 empty
ST5 empty
ST6 empty
ST7 empty
3 2 1 0 E S P U O Z D I
FST 0000 Cond 0 0 0 0 Err 0 0 0 0 0 0 0 0 (GT)
FCW 027F Prec NEAR,53 Mask 1 1 1 1 1 1

Stackview:
ESP-20 > 00430043 CC winamp.00430043
ESP-1C > 00430043 CC winamp.00430043
ESP-18 > 00430043 CC winamp.00430043
ESP-14 > 00430043 CC winamp.00430043
ESP-10 > 00430043 CC winamp.00430043
ESP-C > 00430043 CC winamp.00430043
ESP-8 > 00430043 CC winamp.00430043
ESP-4 > 00430043 CC winamp.00430043
ESP ==> > 00430043 CC winamp.00430043
ESP+4 > 00430043 CC winamp.00430043
ESP+8 > 00430043 CC winamp.00430043
ESP+C > 00430043 CC winamp.00430043
ESP+10 > 00430043 CC winamp.00430043
ESP+14 > 00430043 CC winamp.00430043
ESP+18 > 00430043 CC winamp.00430043
ESP+1C > 00430043 CC winamp.00430043
ESP+20 > 00430043 CC winamp.00430043

Vulnerable code part:
.text:07990871 lea eax, [ebp+WideCharStr]
.text:07990877 push eax ; lpString
.text:07990878 push 3EEh ; nIDDlgItem
.text:0799087D push [ebp+hDlg] ; hDlg
.text:07990880 call ds:GetDlgItemTextW
.text:07990886 lea eax, [ebp+WideCharStr]
[...]
.text:0799097C mov dword_79A9D68, eax
.text:07990981 mov dword_79A9D70, eax
.text:07990986 mov dword_79A9D6C, eax
.text:0799098B mov dword_79ACB54, eax
.text:07990990 pop ebx
.text:07990991 leave
.text:07990992 retn


6. SOLUTION
-----------
Update to latest version v5.64 or newer.


7. REPORT TIMELINE
------------------
2013-06-05: Discovery of the vulnerability
2013-06-06: Vendor acknowledgement of the issue
2013-06-11: Vendor already fixed this issue in v5.7 Beta build 3403
2013-06-12: Confirmation that the issue is fixed
2013-06-19: Vendor releases v5.64 which includes the fix
2013-07-01: Coordinated Disclosure


8. REFERENCES
-------------
http://security.inshell.net
http://forums.winamp.com/showthread.php?t=364291
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close