Check Point Reference: | CPAI-2007-264 |
Date Published: | 24 Mar 2010 |
Severity: | High |
Last Updated: | Wednesday 24 March, 2010 |
Source: | |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Nullsoft Winamp is a popular multimedia player application that is capable of playing many formats of audio and video files. Winamp can play CD tracks, MP3 music files or MPEG video files as well as numerous other formats. It is also capable of reading MPEG-4 files which contain compressed audio and visual digital data. The MPEG-4 file has file extension .mp4. There exists a memory corruption vulnerability in Nullsoft Winamp. The vulnerability is due to improper handling of certain exceptional conditions that could occur while processing crafted MP4 files. Remote attackers can exploit this vulnerability by enticing target users to open a crafted MP4 file that would cause memory corruption. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user. In an attack case where code injection is not successful, the vulnerable Winamp application processing the malicious MP4 file will terminate abnormally. In a more sophisticated attack, where code injection is successful, the behavior of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current logged-in user. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Nullsoft Winamp MP4 files handling memory corruption