Winamp libraries buffer overflow vulnerabilit
Reporter | Title | Published | Views | Family All 16 |
---|---|---|---|---|
Prion | Stack overflow | 16 Apr 201422:55 | – | prion |
Packet Storm | WinAmp 5.63 Buffer Overflow | 27 Aug 201300:00 | – | packetstorm |
Packet Storm | WinAmp 5.63 Buffer Overflow | 1 Jul 201300:00 | – | packetstorm |
NVD | CVE-2013-4694 | 16 Apr 201422:55 | – | nvd |
Exploit DB | Winamp 5.63 - 'winamp.ini' Local Overflow | 26 Aug 201300:00 | – | exploitdb |
Exploit DB | Winamp 5.63 - Stack Buffer Overflow | 2 Jul 201300:00 | – | exploitdb |
Kaspersky | KLA10020 DoS vulnerability in Winamp | 16 Apr 201400:00 | – | kaspersky |
Cvelist | CVE-2013-4694 | 16 Apr 201422:00 | – | cvelist |
securityvulns | [CVE-2013-4694] WinAmp v5.63 gen_jumpex.dll and ml_local.dll Multiple Buffer Overflows | 8 Jul 201300:00 | – | securityvulns |
securityvulns | WinAmp security vulnerabilities | 8 Jul 201300:00 | – | securityvulns |
Source | Link |
---|---|
xforce | www.xforce.iss.net/xforce/xfdb/85399 |
securityfocus | www.securityfocus.com/bid/60883 |
forums | www.forums.winamp.com/showthread.php |
# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:nullsoft:winamp";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.804845");
script_version("2024-02-19T05:05:57+0000");
script_cve_id("CVE-2013-4694");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_tag(name:"last_modification", value:"2024-02-19 05:05:57 +0000 (Mon, 19 Feb 2024)");
script_tag(name:"creation_date", value:"2014-09-18 16:49:22 +0530 (Thu, 18 Sep 2014)");
script_name("Winamp Libraries Multiple Buffer Overflow Vulnerability (Sep 2014)");
script_tag(name:"summary", value:"Winamp is prone to a buffer overflow vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Flaw exists as user-supplied input is not
properly validated when handling a specially crafted overly long Skins directory
name.");
script_tag(name:"impact", value:"Successful exploitation will allow remote
attackers to cause a denial of service or potentially allowing the execution
of arbitrary code.");
script_tag(name:"affected", value:"Winamp prior version 5.64 Build 3418");
script_tag(name:"solution", value:"Upgrade to Winamp version 5.64 Build 3418
or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/85399");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/60883");
script_xref(name:"URL", value:"http://forums.winamp.com/showthread.php?t=364291");
script_copyright("Copyright (C) 2014 Greenbone AG");
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"executable_version");
script_family("Buffer overflow");
script_dependencies("secpod_winamp_detect.nasl");
script_mandatory_keys("Winamp/Version");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if(!version = get_app_version(cpe:CPE)){
exit(0);
}
if(version_is_less(version:version, test_version:"5.6.4.3418"))
{
report = report_fixed_ver(installed_version:version, fixed_version:"5.6.4.3418");
security_message(port:0, data:report);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo