SB2014041712 - Multiple vulnerabilities in Nullsoft Winamp
Published: April 17, 2014 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2014-3442)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Winamp 5.666 and earlier allows remote attackers to cause a denial of service (memory corruption and crash) via a malformed .FLV file, related to f263.w5s.
2) Input validation error (CVE-ID: CVE-2013-4694)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://packetstormsecurity.com/files/126636
- http://www.securityfocus.com/bid/67429
- https://exchange.xforce.ibmcloud.com/vulnerabilities/93173
- http://forums.winamp.com/showthread.php?t=364291
- http://osvdb.org/94739
- http://osvdb.org/94740
- http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html
- http://packetstormsecurity.com/files/122978
- http://seclists.org/fulldisclosure/2013/Jul/4
- http://www.exploit-db.com/exploits/26558
- http://www.securityfocus.com/bid/60883
- http://www.securitytracker.com/id/1030107
- https://exchange.xforce.ibmcloud.com/vulnerabilities/85399
- https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695