Check Point Reference: | CPAI-2005-270 |
Date Published: | 1 Oct 2009 |
Severity: | High |
Last Updated: | Sunday 19 April, 2015 |
Source: | |
Industry Reference: | CVE-2005-2310 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Nullsoft Winamp 5.093 and prior |
Vulnerability Description | Winamp is a popular multimedia player, produced by NullSoft, that is capable of playing many formats of audio and video files. Winamp is capable of retrieving and displaying metadata embedded in media files. There exists a buffer overflow vulnerability in Winamp. The vulnerability is caused due to a boundary error in the handling of ID3v2 tags. A remote attacker can exploit the vulnerability by enticing the victim to add a malicious MP3 file to the playlist and play it. The exploitation of the vulnerability can cause a denial of service or the execution of arbitrary code with privileges of the currently logged in user. In an attack scenario, where arbitrary code is attempted to be injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. Any code injected into the vulnerable program would execute in the security context of the Winamp process. If such an attack is not executed successfully, the vulnerable application may terminate as a result of the attack attempt. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Media Player Enforcement Violation.
Attack Information: Winamp ID3v2 Tag handling buffer overflow