CVE-2013-4694

Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:0.20a:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:0.92:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:1.006:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:1.90:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:2.6:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:2.9:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:2.92:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.1:-:surround:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.51:beta:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.54:beta:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.55:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.55:beta:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.56:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.57:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.58:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.59:beta:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.61:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.531:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.551:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.552:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.572:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.581:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.623:*:*:*:*:*:*:*

History

21 Nov 2024, 01:56

Type Values Removed Values Added
References () http://forums.winamp.com/showthread.php?t=364291 - Patch, Vendor Advisory () http://forums.winamp.com/showthread.php?t=364291 - Patch, Vendor Advisory
References () http://osvdb.org/94739 - () http://osvdb.org/94739 -
References () http://osvdb.org/94740 - () http://osvdb.org/94740 -
References () http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html - Exploit () http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html - Exploit
References () http://packetstormsecurity.com/files/122978 - Exploit () http://packetstormsecurity.com/files/122978 - Exploit
References () http://seclists.org/fulldisclosure/2013/Jul/4 - Exploit () http://seclists.org/fulldisclosure/2013/Jul/4 - Exploit
References () http://www.exploit-db.com/exploits/26558 - Exploit () http://www.exploit-db.com/exploits/26558 - Exploit
References () http://www.securityfocus.com/bid/60883 - Exploit () http://www.securityfocus.com/bid/60883 - Exploit
References () http://www.securitytracker.com/id/1030107 - () http://www.securitytracker.com/id/1030107 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/85399 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/85399 -
References () https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 - Exploit () https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 - Exploit

Information

Published : 2014-04-16 22:55

Updated : 2024-11-21 01:56


NVD link : CVE-2013-4694

Mitre link : CVE-2013-4694

CVE.ORG link : CVE-2013-4694


JSON object : View

Products Affected

nullsoft

  • winamp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer