VUPEN Security Research - Winamp PNG and JPEG Data Integer Overflow Vulnerabilities
Winamp is a proprietary media player written by Nullsoft, now a subsidiary of AOL. It is skinnable, multi-format freeware/shareware (from Wikipedia).
Winamp is a one of the world's most popular media players with over 73 million users globally (comScore Media Metrix, January 2009).
VUPEN Vulnerability Research Team discovered critical vulnerabilities affecting Winamp.
These vulnerabilities are caused due to integer overflow errors within the "jpeg.w5s" and "png.w5s" filters when processing malformed JPEG or PNG data in a media (e.g. MP3) file, which could allow attackers to execute arbitrary code by tricking a user into opening a specially crafted MP3.
Winamp version 5.56 and prior
In-depth binary analysis of the vulnerabilities and proof-of-concept codes have been released by VUPEN Security through the VUPEN Exploits & PoCs Service :
Upgrade to Winamp version 5.57 : http://www.winamp.com/media-player
The vulnerabilities were discovered by Nicolas JOLY of VUPEN Security
2009-11-25 - Vendor notified 2009-11-25 - Vendor response 2009-12-02 - Status update received 2009-12-17 - Coordinated public Disclosure