Release date:
Updated on:
Affected Systems:
Nullsoft Winamp 5.622
Description:
--------------------------------------------------------------------------------
Bugtraq id: 54131
Winamp is a popular Universal Music player.
Winamp 5.622 has multiple implementation vulnerabilities that can be exploited by malicious users to control user systems.
1) when the strf block value is used to allocate memory to process BI_RGB video data in the AVI file, an error exists in bmp. w5s, which can be exploited to cause heap buffer overflow.
2) When the strf block value is used to allocate memory to process UYVY video data in the AVI file, an error exists in bmp. w5s, which can be exploited to cause heap buffer overflow.
3) when processing TSCC data in the AVI file, there is an error in bmp. w5s, which can be exploited to cause heap buffer overflow.
4) The in_mod.dll module contains unknown details when processing IT files, which can be exploited to corrupt the memory.
<* Source: Hossein Lotfi
Link: http://secunia.com/advisories/46624/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Nullsoft
--------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.winamp.com/