First published: Fri Dec 31 2004(Updated: )
Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NullSoft Winamp | =5.05 | |
NullSoft Winamp | =5.02 | |
NullSoft Winamp | =5.01 | |
NullSoft Winamp | =5.04 | |
NullSoft Winamp | =5.06 | |
NullSoft Winamp | =5.07 | |
NullSoft Winamp | =5.03 | |
NullSoft Winamp | =5.0 | |
NullSoft Winamp | =5.08c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.