New Winamp version fixes flaw

By
Follow google news

Users of the Winamp application were told this week to upgrade their software in responses to a bug in version 5.12 of the program.

The zero-day exploit, revealed earlier this week, allows remote code execution through the use of a crafted playlist, or .pls, file.


"The proof-of-concept exploit suggests using an iframe to trigger a 'drive-by' attack on anyone unlucky enough to visit a website containing a malicious iframe; say, third-party advertisers and forum websites – the usual vectors for this sort of thing," Ed Skoudis of the SANS Internet Storm Center said this week.

Nullsoft, Winamp's maker, released a new version – 5.13 - of its product on Monday, and urged users to download the updated software, which does not contain the vulnerability.

Secunia, which classified the flaw as "extremely critical," said ATmaCA reported the flaw and also recommended users update to version 5.13.

"The vulnerability is caused due to a boundary error during the handling of filenames including a computer name," Secunia warned. "This can be exploited to cause a bugger overflow via a specially crafter playlist containing a filename starting with an overly long computer name (about 1040 bytes). Successful exploitation has been confirmed in version 5.12. Other versions may also be affected."

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

National photo licence recognition system set to go live in 2025

National photo licence recognition system set to go live in 2025

Hackers using F5 devices to target US gov networks

Hackers using F5 devices to target US gov networks

Qantas says customer data released by cyber criminals

Qantas says customer data released by cyber criminals

Austrade to replace its data centre core network

Austrade to replace its data centre core network

Log In

  |  Forgot your password?