exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NSFOCUS Security Advisory 2006.1

NSFOCUS Security Advisory 2006.1
Posted Feb 26, 2006
Authored by NSFOCUS, Liu Yexin | Site nsfocus.com

NSFOCUS Security Advisory - The NSFocus Security Team has discovered a buffer overflow vulnerability when Winamp processes .m3u files, which might cause Winamp to crash or even execute arbitrary code when a user loads a malicious .m3u file and plays it. Affected software includes Nullsoft Winamp version 5.12 and 5.13.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-0720
SHA-256 | 8dadda208c99cdc53be72be04a2cd2d0749f14f94461308a501d946622836140

NSFOCUS Security Advisory 2006.1

Change Mirror Download
NSFOCUS Security Advisory (SA2006-01)

Winamp m3u File Processing Buffer Overflow Vulnerability

Release Date: 2006-02-23

CVE ID: CVE-2006-0720

http://www.nsfocus.com/english/homepage/research/0601.htm

Affected systems & software
===========================

Nullsoft Winamp 5.12
Nullsoft Winamp 5.13

Unaffected systems & software
=============================

Nullsoft Winamp 5.2

Summary
=========

Winamp is a popular media player that supports various media formats and
playlist formats, including m3u and pls formats.

NSFocus Security Team discovered a buffer overflow vulnerability when Winamp
processes .m3u files, which might cause Winamp to crash or even execute
arbitrary code when a user load a malicious .m3u file and play.

Description
============

Winamp can play files by loading .m3u file. When the playing is paused or stopped,
Winamp will reset the title of the program, where function strncpy() is incorrectly
called, resulting in a static buffer overflow.

An attacker can cause winamp to crash by crafting a malicious .m3u file.
Remote code execution is possible but difficult.

Workaround
=============

Cancel .m3u file association to Winamp, and do not open untrusted .m3u files.

Vendor Status
==============

2006.02.13 Informed the vendor.
2006.02.15 The vendor confirmed the vulnerability.
2006.02.21 The vendor releases a new version to fix the vulnerability.

The vendor has released Winamp 5.2 to fix this vulnerability, which is available
for download at:
http://www.winamp.com/player/
http://forums.winamp.com/showthread.php?threadid=238648

Additional Information
========================

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2006-0720 to this issue. This is a candidate for inclusion in the
CVE list (http://cve.mitre.org), which standardizes names for security problems.
Candidates may change significantly before they become official CVE entries.

Acknowledgment
===============

Liu Yexin of NSFocus Security Team found the vulnerability.

DISCLAIMS
==========
THE INFORMATION PROVIDED IS RELEASED BY NSFOCUS "AS IS" WITHOUT WARRANTY
OF ANY KIND. NSFOCUS DISCLAIMS ALL WARRANTIES, EITHER EXPRESSED OR IMPLIED,
EXCEPT FOR THE WARRANTIES OF MERCHANTABILITY. IN NO EVENT SHALL NSFOCUS
BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL,CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF NSFOCUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
DISTRIBUTION OR REPRODUCTION OF THE INFORMATION IS PROVIDED THAT THE
ADVISORY IS NOT MODIFIED IN ANY WAY.

Copyright 1999-2006 NSFOCUS. All Rights Reserved. Terms of use.


NSFOCUS Security Team <security@nsfocus.com>
NSFOCUS INFORMATION TECHNOLOGY CO.,LTD
(http://www.nsfocus.com)
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close