Vulnerabilities > CVE-2006-0720 - Buffer Overflow vulnerability in Nullsoft Winamp M3U File Processing

047910
CVSS 7.6 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
high complexity
nullsoft
nessus
exploit available

Summary

Stack-based buffer overflow in Nullsoft Winamp 5.12 and 5.13 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted .m3u file that causes an incorrect strncpy function call when the player pauses or stops the file.

Vulnerable Configurations

Part Description Count
Application
Nullsoft
2

Exploit-Db

descriptionWinamp 5.12 - (.m3u) Stack Based Buffer Overflow. CVE-2006-0720. Local exploit for windows platform
idEDB-ID:26245
last seen2016-02-03
modified2013-06-17
published2013-06-17
reportersuperkojiman
sourcehttps://www.exploit-db.com/download/26245/
titleWinamp 5.12 - .m3u Stack Based Buffer Overflow

Nessus

NASL familyWindows
NASL idWINAMP_52.NASL
descriptionThe remote host is using Winamp, a popular media player for Windows. The version of Winamp installed on the remote Windows host reportedly crashes if the user tries to open an M3U file with a long filename. In addition, it reportedly contains a buffer overflow flaw that can be exploited using a specially crafted M3U file to either crash the application or possibly even execute arbitrary code remotely.
last seen2020-06-01
modified2020-06-02
plugin id20973
published2006-02-25
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20973
titleWinamp < 5.2 Multiple Vulnerabilities
code
#
#  (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(20973);
  script_version("1.21");
  script_cvs_date("Date: 2018/11/15 20:50:29");

  script_cve_id("CVE-2006-0708", "CVE-2006-0720");
  script_bugtraq_id(16623, 16785);
  script_xref(name:"EDB-ID", value:"26245");

  script_name(english:"Winamp < 5.2 Multiple Vulnerabilities");
  script_summary(english:"Checks the version number of Winamp");

  script_set_attribute(attribute:"synopsis", value:
"A multimedia application that is vulnerable to denial of service
attacks is installed on the remote Windows host.");
  script_set_attribute(attribute:"description", value:
"The remote host is using Winamp, a popular media player for Windows. 

The version of Winamp installed on the remote Windows host reportedly
crashes if the user tries to open an M3U file with a long filename. 

In addition, it reportedly contains a buffer overflow flaw that can be
exploited using a specially crafted M3U file to either crash the
application or possibly even execute arbitrary code remotely.");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/424903/30/0/threaded");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/425888/30/0/threaded");
  script_set_attribute(attribute:"see_also", value:"http://www.winamp.com/player/version-history");
  script_set_attribute(attribute:"solution", value:"Upgrade to Winamp version 5.2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2006/02/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2006/02/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/02/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:nullsoft:winamp");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");

  script_dependencies("winamp_in_cdda_buffer_overflow.nasl");
  script_require_keys("SMB/Winamp/Version");
  exit(0);
}

include("smb_func.inc");

# Check version of Winamp.

ver = get_kb_item("SMB/Winamp/Version");
if (
  ver &&
  ver =~ "^([0-4]\.|5\.[01]\.)"
) {
  security_hole(kb_smb_transport());
}

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/122040/winamp512m3u-overflow.txt
idPACKETSTORM:122040
last seen2016-12-05
published2013-06-16
reportersuperkojiman
sourcehttps://packetstormsecurity.com/files/122040/Winamp-5.12-Buffer-Overflow.html
titleWinamp 5.12 Buffer Overflow

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:79888
last seen2017-11-19
modified2014-07-01
published2014-07-01
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-79888
titleWinamp 5.12 (.m3u) - Stack Based Buffer Overflow