Vulnerabilities > CVE-2004-0820 - Local Security vulnerability in Winamp
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Winamp before 5.0.4 allows remote attackers to execute arbitrary script in the Local computer zone via script in HTML files that are referenced from XML files contained in a .wsz skin file.
Vulnerable Configurations
Exploit-Db
description | Winamp. CVE-2004-0820. Remote exploit for windows platform |
id | EDB-ID:418 |
last seen | 2016-01-31 |
modified | 2004-08-25 |
published | 2004-08-25 |
reporter | Petrol Designs |
source | https://www.exploit-db.com/download/418/ |
title | Winamp <= 5.04 - Skin File .wsz Remote Code Execution Exploit |
Nessus
NASL family | Windows |
NASL id | WINAMP_WSZ_OVERFLOW.NASL |
description | The remote host is using Winamp, a popular media player which handles many files format (mp3, wavs and more...) The remote version of this software is vulnerable to a code execution flaw when processing a malformed .WSZ Winamp Skin file. An attacker may exploit this flaw by sending a malformed .wsz file to a victim on the remote host, and wait for him to load it within Winamp. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16204 |
published | 2005-01-19 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16204 |
title | Winamp < 5.0.5 Skin File (.WSZ) Local Zone Arbitrary Code Execution |
code |
|