what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

nullsoftwinamp-dos.txt

nullsoftwinamp-dos.txt
Posted Aug 1, 2007
Authored by destructor, nait

Nullsoft's Winamp Lite versions 5.35 and below suffer from a denial of service condition.

tags | advisory, denial of service
SHA-256 | 00c70240c9cd8fa3cc700af00d46e17d580294f07d99fe645c232b4d5d1d74ce

nullsoftwinamp-dos.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

---------------------------------------------------
| BuHa Security-Advisory #15 | Jul 30th, 2007 |
---------------------------------------------------
| Vendor | Nullsoft's Winamp (Lite) |
| URL | http://www.winamp.com/ |
| Version | <= 5.35 |
| Risk | Low (Denial Of Service) |
---------------------------------------------------

o Description:
=============

Winamp is a proprietary media player for Windows systems. Visit
http://www.winamp.com/ for detailed information.

o Denial Of Service:
===================

The M3U file format allows it to include local and remote files by
simply specifing the path to the desired file. Furthermore Winamp does
not check if the M3U file to include is the currently processed M3U
file wherefore it's possible to force Winamp to recursively read a
certain M3U file. Winamp allocates memory by each iteration which
leads to a stack overflow exception (0xc00000fd).

You are able to simply test this bug yourself by creating a file named
'a.m3u' with the content 'a.m3u'. If you are using the standard version
of Winamp (not the Lite version) you just have to add the M3U file to
Winamp by for example simply dragging the file into the playlist.

The lite version catches the exception and exits if you add the
malformed M3U file to the playlist. If you use the "Enqueue in Winamp"
option (if configured you'll find it in the context menu) Winamp Lite
does not catch the exception and crashes too.

It's also possible to add a remote file to the playlist by clicking
on Add -> Add URL and inserting a URL like:
http://morph3us.org/security/pen-testing/winamp/a.m3u

These are the register values and the ASM dump at the time of the stack
overflow exception:
> eax=00000d64 ebx=0000025b ecx=00032b90 edx=7c91eb94 esi=00000000
> edi=000381c0 eip=0045ffe5 esp=00036b88 ebp=00036b90
>
> Function: winamp
> 0045ffba cc int 3
> 0045ffbb cc int 3
> 0045ffbc cc int 3
> 0045ffbd cc int 3
> 0045ffbe cc int 3
> 0045ffbf cc int 3
> 0045ffc0 3d00100000 cmp eax,0x1000
> 0045ffc5 730e jnb winamp+0x5ffd5 (0045ffd5)
> 0045ffc7 f7d8 neg eax
> 0045ffc9 03c4 add eax,esp
> 0045ffcb 83c004 add eax,0x4
> 0045ffce 8500 test [eax],eax
> 0045ffd0 94 xchg eax,esp
> 0045ffd1 8b00 mov eax,[eax]
> 0045ffd3 50 push eax
> 0045ffd4 c3 ret
> 0045ffd5 51 push ecx
> 0045ffd6 8d4c2408 lea ecx,[esp+0x8]
> 0045ffda 81e900100000 sub ecx,0x1000
> 0045ffe0 2d00100000 sub eax,0x1000
> FAULT ->0045ffe5 8501 test [ecx],eax
> ds:0023:00032b90=00000000
> 0045ffe7 3d00100000 cmp eax,0x1000
> 0045ffec 73ec jnb winamp+0x5ffda (0045ffda)
> 0045ffee 2bc8 sub ecx,eax
> 0045fff0 8bc4 mov eax,esp
> 0045fff2 8501 test [ecx],eax
> 0045fff4 8be1 mov esp,ecx
> 0045fff6 8b08 mov ecx,[eax]
> 0045fff8 8b4004 mov eax,[eax+0x4]
> 0045fffb 50 push eax
> 0045fffc c3 ret
> 0045fffd cc int 3
> 0045fffe cc int 3
> 0045ffff cc int 3
> 00460000 80f940 cmp cl,0x40
> 00460003 7316 jnb winamp+0x6001b (0046001b)
> 00460005 80f920 cmp cl,0x20
> 00460008 7306 jnb winamp+0x60010 (00460010)
> 0046000a 0fadd0 shrd eax,edx,cl
> 0046000d d3fa sar edx,cl
> 0046000f c3 ret

This bug does not seem to be exploitable.

o Disclosure Timeline:
=====================

xx Jan 07 - Vulnerability discovered.
14 Apr 07 - Vendor contacted.
30 Jul 07 - Public release.

o Solution:
==========

There is no solution yet.

I sent a mail to support@winamp.com (I did not find a better contact
address) on April the 14th but did not receive an answer until now.

o Credits:
=========

Thanks to destructor who originally spotted the bug and nait who analysed
the vulnerability.

Christian Deneke (nait) <bugtraq@deneke.biz>
http://www.deneke.biz/

Thomas Waldegger <bugtraq@morph3us.org>
BuHa-Security Community - http://buha.info/board/

If you have questions, suggestions or criticism about the advisory feel
free to send me a mail. The address 'bugtraq@morph3us.org' is more a
spam address than a regular mail address therefore it's possible that
some mails get ignored. Please use the contact details at
http://morph3us.org/ to contact me.

Greets fly out to..
* cyrus-tc: how are the Paris chicks, bro?
* fallout: let the 'curtain show' never end.. :oP
* trappy: skill0r!1!!

.. echox, Killsystem, Neon, Rodnox and all members of BuHa.

Advisory online: http://morph3us.org/advisories/20070730-winamp-5.35.txt

- --
Don't you feel the power of CSS Layouts?
BuHa-Security Community: https://buha.info/board/

-----BEGIN PGP SIGNATURE-----
Version: n/a
Comment: http://morph3us.org/

iD8DBQFGrkFJkCo6/ctnOpYRA3VYAJ4y8nAzJNsN/JdyKeOBRjSiWUvUHACfZmc5
Xbi8XD2i4d4nKJZz6J2+kTk=
=H5FQ
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close