First published: Thu Feb 23 2006(Updated: )
Stack-based buffer overflow in Nullsoft Winamp 5.12 and 5.13 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted .m3u file that causes an incorrect strncpy function call when the player pauses or stops the file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Winamp iPod Plugin | =5.12 | |
Winamp iPod Plugin | =5.13 | |
Winamp | =5.12 | |
Winamp | =5.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0720 has a significant severity level due to its potential for denial of service and remote code execution.
To fix CVE-2006-0720, update to a patched version of Winamp, which resolves this buffer overflow vulnerability.
In CVE-2006-0720, a buffer overflow occurs due to an incorrect strncpy function call when processing crafted .m3u files.
CVE-2006-0720 affects users of Nullsoft Winamp versions 5.12 and 5.13.
CVE-2006-0720 requires user assistance, meaning that an attacker must convince the user to open a malicious .m3u file.