Описание
Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.
Ссылки
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*
cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06625
Низкий
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.
EPSS
Процентиль: 91%
0.06625
Низкий
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other