Short Name |
HTTP:STC:WINAMP:AU-OF1 |
---|---|
Severity |
Low |
Recommended |
No |
Category |
HTTP |
Keywords |
winamp mp3 overflow http |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in WinAmp. Winamp 2.80a and earlier are vulnerabile. By default, WinAmp automatically contacts www.winamp.com for update information upon startup. Attackers can operate a malicious server that sends an extremely long response to a client's WinAmp update request, causing a buffer overflow.
Nullsoft Winamp is a media player for Microsoft Windows supporting MP3 and other filetypes. Winamp is vulnerable to a buffer overflow condition when checking for updated versions. A malicious server located at www.winamp.com may return a malicious response. Exploitation may result in the execution of arbitrary code as the Winamp process. It may be possible to exploit this vulnerability if an attacker can control the resolution of the www.winamp.com domain, possibly through DNS cache poisoning.