BugTraq
Re: Winamp 5.02 Long Filename Buffer Overflow Vulnerability Mar 20 2004 04:49PM
b0f www.b0f.net (b0fnet yahoo com)
In-Reply-To: <20040319164427.31207.qmail (at) www.securityfocus (dot) com [email concealed]>

Hmm i noticed this before with .pls and .m3u files winamp will open when a .m3u or .pls link is clicked via internet explorer but winamp doesn't seem to crash. Also if winamp is opened in cmd.exe like winamp.exe [long file name] it will also crash take a look at http://www.rosiello.org/archivio/winamp-exploit.c

-b0f

>Received: (qmail 17247 invoked from network); 19 Mar 2004 16:55:45 -0000

>Received: from outgoing2.securityfocus.com (205.206.231.26)

> by mail.securityfocus.com with SMTP; 19 Mar 2004 16:55:45 -0000

>Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])

> by outgoing2.securityfocus.com (Postfix) with QMQP

> id B17F28FD24; Fri, 19 Mar 2004 04:57:22 -0700 (MST)

>Mailing-List: contact bugtraq-help (at) securityfocus (dot) com [email concealed]; run by ezmlm

>Precedence: bulk

>List-Id: <bugtraq.list-id.securityfocus.com>

>List-Post: <mailto:bugtraq (at) securityfocus (dot) com [email concealed]>

>List-Help: <mailto:bugtraq-help (at) securityfocus (dot) com [email concealed]>

>List-Unsubscribe: <mailto:bugtraq-unsubscribe (at) securityfocus (dot) com [email concealed]>

>List-Subscribe: <mailto:bugtraq-subscribe (at) securityfocus (dot) com [email concealed]>

>Delivered-To: mailing list bugtraq (at) securityfocus (dot) com [email concealed]

>Delivered-To: moderator for bugtraq (at) securityfocus (dot) com [email concealed]

>Received: (qmail 28984 invoked from network); 19 Mar 2004 10:30:20 -0000

>Date: 19 Mar 2004 16:44:27 -0000

>Message-ID: <20040319164427.31207.qmail (at) www.securityfocus (dot) com [email concealed]>

>Content-Type: text/plain

>Content-Disposition: inline

>Content-Transfer-Encoding: binary

>MIME-Version: 1.0

>X-Mailer: MIME-tools 5.411 (Entity 5.404)

>From: Tobias Welter <newbie (at) e-mails (dot) ru [email concealed]>

>To: bugtraq (at) securityfocus (dot) com [email concealed]

>Subject: Winamp 5.02 Long Filename Buffer Overflow Vulnerability

>

>

>

>Audio files with names longer than 246 characters crashing the Player on double click.

>

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus