English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Winamp AVI / IT File Processing Vulnerabilities


Secunia ID

SA46882

CVE-ID

CVE-2011-3834, CVE-2011-4857

Release Date

12 Dec 2011

Last Change

29 Dec 2011

Criticality

Highly Critical

Solution Status

Vendor Patch

Software

Winamp 5.x

Where

From remote

Impact
System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Description

Multiple vulnerabilities have been discovered in Winamp, which can be exploited by malicious people to compromise a user's system.

1) An integer overflow error in the in_avi.dll plugin when allocating memory using the number of streams header value can be exploited to cause a heap-based buffer overflow via a specially crafted AVI file.

2) An integer overflow error in the in_avi.dll plugin when allocating memory using the RIFF INFO chunk's size value can be exploited to cause a heap-based buffer overflow via a specially crafted AVI file.

3) An error in the in_mod.dll plugin when parsing the song message data within Impulse Tracker (IT) files can be exploited to cause a heap-based buffer overflow.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are confirmed in version 5.622. Other versions may also be affected.

Solution

Update to version 5.623.

Reported by

1, 2) Dmitriy Pletnev, Secunia Research.
3) Hossein Lotfi via Secunia.

Original Advisory

Winamp:
http://forums.winamp.com/showthread.php?t=332010

Secunia Research:
http://secunia.com/secunia_research/2011-81/