8.6 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.191 Low
EPSS
Percentile
96.1%
Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk.
forums.winamp.com/showthread.php?t=364291
osvdb.org/94739
osvdb.org/94740
packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html
packetstormsecurity.com/files/122978
seclists.org/fulldisclosure/2013/Jul/4
www.securityfocus.com/bid/60883
www.securitytracker.com/id/1030107
exchange.xforce.ibmcloud.com/vulnerabilities/85399
www.exploit-db.com/exploits/26558
www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695