Vulnerability Note VU#604745
Winamp fails to properly handle playlists with long "file" parameter
Winamp contains a buffer overflow vulnerability when processing a playlist that has a long file parameter. This may allow a remote unauthenticated attacker to execute arbitrary code on a vulnerable system.
Winamp is a media player for Microsoft Windows systems. It can play various types of media files, such as MP3s. Winamp was created by Nullsoft, which has been acquired by America Online.
A remote unauthenticated attacker may be able to execute arbitrary code by convincing a user to open a specially crafted playlist. This can be achieved by creating a specially crafted web page or other HTML document that may launch Winamp without any user interaction.
Install an update
Because a web browser can be used as an attack vector for this vulnerability, configure your web browser to prompt before opening Winamp playlist files. This can help prevent automated exploitation as the result of viewing a web page.
Internet Explorer will open Winamp playlist files without prompting the user. It is possible to modify this behavior so that Internet Explorer will prompt the user before opening Winamp playlist files. To make this change, modify the following registry value:
Set the value to: REG_BINARY 00 00 00 00
The default configuration of Mozilla Firefox appears to prompt before opening Winamp playlist files. However, if the user has chosen to have playlist files open without prompting, this behavior can be reset by following the instructions in the document Securing Your Web Browser. This document provides instructions for how to configure Mozilla Firefox to save various file types to disk, rather than opening them with the associated application.
Do not open Winamp playlist files (.PLS or .M3U) from untrusted sources.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|America Online, Inc.||Affected||-||31 Jan 2006|
CVSS Metrics (Learn More)
This vulnerability was publicly disclosed by ATmaCA.
This document was written by Will Dormann.
- CVE IDs: CVE-2006-0476
- Date Public: 29 Jan 2006
- Date First Published: 31 Jan 2006
- Date Last Updated: 23 Feb 2006
- Severity Metric: 58.91
- Document Revision: 21
If you have feedback, comments, or additional information about this vulnerability, please send us email.