BugTraq
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
Winamp 5.12 - 0day exploit - code execution through playlist Jan 30 2006 03:00PM
Process (processtree rootonfire org)
The current version of winamp contains an error in its playlist parsing allowing malicious users to
execute code via a prepared playlist.

This bug can even be triggered through a website - without user interaction - by linking to a pls
file in an IFRAME tag.

Windows DEP (Data Execution Prevention)...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus