Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:WINAMP:MOD-HDR-OF

Severity

High

Recommended

No

Category

HTTP

Keywords

WinAmp MOD Header Overflow

Release Date

2004/04/07

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: WinAmp MOD Header Overflow


This signature detects attempts to exploit a known vulnerability against WinAmp. Attackers can send maliciously crafted MOD file headers containing more than 20 bytes for the module name or tracker name to overflow the buffer in WinAmp and remotely execute code.

Extended Description

It has been reported that the Winamp 'in_mod.dll' plug-in is prone to a heap overflow vulnerability that may allow a remote attacker to cause the application to crash or possibly execute arbitrary code in order to gain unuauthorized access. The issue is reported to present itself due to insufficient boundary checks performed by the affected plug-in. Winamp versions 2.91 to 5.02 are reported to be prone to this issue. Older versions may be affected as well.

Affected Products

  • NullSoft Winamp 2.91.0
  • NullSoft Winamp 3.0.0
  • NullSoft Winamp 3.1.0
  • NullSoft Winamp 5.0.0 1
  • NullSoft Winamp 5.0.0 2

References

  • BugTraq: 10045
  • CVE: CVE-2004-1896
  • URL: http://www.nextgenss.com/advisories/winampheap.txt

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out