BugTraq
Foundstone Research Labs Advisory - Multiple Exploitable Buffer Overflows in Winamp (fwd) Dec 19 2002 12:31AM
Dave Ahmad (da securityfocus com) (1 replies)
Re: Foundstone Research Labs Advisory - Multiple Exploitable Buffer Overflows in Winamp (fwd) Dec 19 2002 05:48PM
David Howe (DaveHowe gmx co uk) (2 replies)
RE: Foundstone Research Labs Advisory - Multiple Exploitable Buffer Overflows in Winamp (fwd) Dec 19 2002 09:58PM
Russell Garrett (rg tcslon com) (1 replies)
This is an MD5 of a verified patched winamp 2.81, downloaded from
Nullsoft's internal tester site:

C:\>md5 winamp281_full.exe
353709951105A4671F457051157991C9

> -----Original Message-----
> From: David Howe [mailto:DaveHowe (at) gmx.co (dot) uk [email concealed]]
> Sent: 19 December 2002 17:49
> To: Email List: BugTraq
> Subject: Re: Foundstone Research Labs Advisory - Multiple Exploitable
> Buffer Overflows in Winamp (fwd)
>
>
> at Thursday, December 19, 2002 12:31 AM, Dave Ahmad
> <da (at) securityfocus (dot) com [email concealed]> was seen to say:
> > Solution:
> > For Winamp 2.81 users
> > We recommend either upgrading to Winamp 3.0 or redownloading Winamp
> > 2.81 (which has since been fixed) from: http://www.winamp.com
> Does anyone have a more direct URL or a MD5 hash of the "safe" file? the
> current download of 2.81 is still dated Aug 21 and the current 3.0 dated
> 8 Aug (on the site - haven't downloaded 3.0. but the internal date on
> 2.81 is definitely the 21st)
> There is also *nothing* about this on the winamp site - its as if it
> didn't exist.

------------------------------------------------------------------------
----
Russ Garrett russ (at) garrett.co (dot) uk. [email concealed]
http://russ.garrett.co.uk.

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus