Vulnerabilities > CVE-2010-2586 - Numeric Errors vulnerability in Nullsoft Winamp
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Multiple integer overflows in in_nsv.dll in the in_nsv plugin in Winamp before 5.6 allow remote attackers to execute arbitrary code via a crafted Table of Contents (TOC) in a (1) NSV stream or (2) NSV file that triggers a heap-based buffer overflow.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | WINAMP_56.NASL |
description | The remote host is running Winamp, a media player for Windows. The version of Winamp installed on the remote host is earlier than 5.6. Such versions are potentially affected by the following vulnerabilities : - An integer overflow vulnerability exists in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 50846 |
published | 2010-11-30 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/50846 |
title | Winamp < 5.6 Multiple Vulnerabilities |
code |
|
Oval
accepted | 2012-08-13T04:00:06.330-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
definition_extensions |
| ||||||||||||
description | Multiple integer overflows in in_nsv.dll in the in_nsv plugin in Winamp before 5.6 allow remote attackers to execute arbitrary code via a crafted Table of Contents (TOC) in a (1) NSV stream or (2) NSV file that triggers a heap-based buffer overflow. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:12587 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2011-03-18T13:47:07 | ||||||||||||
title | Multiple integer overflow vulnerabilities in the in_nsv plugin in Winamp before 5.6 | ||||||||||||
version | 9 |
References
- http://forums.winamp.com/showthread.php?t=324322
- http://forums.winamp.com/showthread.php?threadid=159785
- http://secunia.com/advisories/42004
- http://secunia.com/secunia_research/2010-127/
- http://www.securityfocus.com/archive/1/514962/100/0/threaded
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12587