WinAmp Blows Another Security Fuse

edited November 2004 in Science & Tech
The bug, a boundary error in the "IN_CDDA.dll" file, is the latest in a string of serious vulnerabilities in WinAmp, including an August flaw in the handling of "skin" files which attackers began to exploit before it had been discovered by researchers.
The new bug, the skin file flaw and an April flaw in in the handling of ".xm" files could all be exploited by luring an affected user to a website containing a specific type of file, which would then be automatically downloaded and executed.

This week's bug can be exploited in a number of ways, the most dangerous being via an ".m3u" playlist file, according to Moore. "When hosted on a website, these files will be automatically downloaded and opened in winamp without any user interaction," he wrote in Security-Assessment.com's advisory. "This is enough to cause the overflow that would allow a malicious playlist to overwrite EIP and execute arbitrary code."

Nullsoft, part of AOL, has patched the bug in WinAmp version 5.06, available from the company's website. Danish security firm Secunia, which maintains a vulnerabilities database, said the bug was "highly critical", its second most serious ranking.
Source: TechWorld

Comments

  • EMTEMT Seattle, WA Icrontian
    edited November 2004
    Argh... that sucks. I don't want to update Winamp...
  • ShivianShivian Australia
    edited November 2004
    Wouldn't not associating WinAmp as the default player of m3u files solve that?
  • EMTEMT Seattle, WA Icrontian
    edited November 2004
    Yeah, sure sounds like it.
Sign In or Register to comment.