Winamp缓冲区溢出漏洞

Winamp缓冲区溢出漏洞

漏洞ID 1106173 漏洞类型 缓冲区溢出
发布时间 2001-01-17 更新时间 2005-05-02
图片[1]-Winamp缓冲区溢出漏洞-安全小百科CVE编号 CVE-2000-0624
图片[2]-Winamp缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200007-055
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/20094
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200007-055
|漏洞详情
Winamp2.64及其之前版本存在缓冲区溢出漏洞。远程攻击者通过超长#EXTINF:M3U播放列表的扩展执行任意命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/1496/info

The M3U Playlist file parser in NullSoft Winamp does not perform proper bounds checking with the extension "#EXTINF:". Therefore, entering a string consisting of over 280 characters in conjunction with this parameter will cause a buffer overflow condition which will either crash the application or allow for arbitrary code to be executed, depending on the data entered.

Cut and paste the following into a M3U file:

EXTM3U
#EXTINF:<string of of over 280 characters>
|参考资料

来源:XF
名称:winamp-playlist-parser-bo
链接:http://xforce.iss.net/static/4956.php
来源:www.winamp.com
链接:http://www.winamp.com/getwinamp/newfeatures.jhtml
来源:BID
名称:1496
链接:http://www.securityfocus.com/bid/1496
来源:BUGTRAQ
名称:20000720WinampM3Uplaylistparserbufferoverflowsecurityvulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2000-07/0289.html

相关推荐: Softwin BitDefender AvxScanOnlineCtrl COM Object Remote File Upload And Execution Vulnerability

Softwin BitDefender AvxScanOnlineCtrl COM Object Remote File Upload And Execution Vulnerability 漏洞ID 1098584 漏洞类型 Design Error 发布时…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享