First published: Tue Dec 31 2002(Updated: )
Buffer overflow in the version update check for Winamp 2.80 and earlier allows remote attackers who can spoof www.winamp.com to execute arbitrary code via a long server response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Winamp iPod Plugin | =2.70 | |
Winamp iPod Plugin | =2.72 | |
Winamp iPod Plugin | =2.73 | |
Winamp iPod Plugin | =2.75 | |
Winamp iPod Plugin | =2.62 | |
Winamp iPod Plugin | =2.65 | |
Winamp iPod Plugin | =2.76 | |
Winamp iPod Plugin | =2.80 | |
Winamp iPod Plugin | =2.74 | |
Winamp iPod Plugin | =2.71 | |
Winamp iPod Plugin | =2.78 | |
Winamp iPod Plugin | =2.61 | |
Winamp iPod Plugin | =2.70 | |
Winamp iPod Plugin | =2.79 | |
Winamp iPod Plugin | =2.60 | |
Winamp iPod Plugin | =2.64 | |
Winamp iPod Plugin | =2.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2195 is considered a critical vulnerability due to its ability to allow remote attackers to execute arbitrary code.
To fix CVE-2002-2195, upgrade to Winamp version 2.81 or later, which resolves the buffer overflow vulnerability.
CVE-2002-2195 affects Winamp versions 2.80 and earlier, including versions 2.60 through 2.79.
CVE-2002-2195 exploits a buffer overflow vulnerability through a maliciously crafted response from a server masquerading as www.winamp.com.
Users can prevent exploits of CVE-2002-2195 by avoiding the use of outdated Winamp versions and applying security patches promptly.