NullSoft WinAmp 2.91/3.0/3.1/5.0.1/5.0.2 in_mod.dll heap-based overflow

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.6 | $0-$5k | 0.00 |
Summary
A vulnerability was found in NullSoft WinAmp 2.91/3.0/3.1/5.0.1/5.0.2. It has been rated as critical. This impacts an unknown function in the library in_mod.dll. The manipulation leads to heap-based overflow. This vulnerability is documented as CVE-2004-1896. The attack can be initiated remotely. Additionally, an exploit exists. Upgrading the affected component is advised.
Details
A vulnerability was found in NullSoft WinAmp 2.91/3.0/3.1/5.0.1/5.0.2 (Multimedia Player Software) and classified as critical. This issue affects an unknown function in the library in_mod.dll. The manipulation with an unknown input leads to a heap-based overflow vulnerability. Using CWE to declare the problem leads to CWE-122. A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Heap-based buffer overflow in in_mod.dll in Nullsoft Winamp 2.91 through 5.02 allows remote attackers to execute arbitrary code via a Fasttracker 2 (.xm) mod media file.
The bug was discovered 02/20/2004. The weakness was released 04/05/2004 by Peter Winter-Smith with NGSSoftware (Website). The advisory is shared at nextgenss.com. The identification of this vulnerability is CVE-2004-1896 since 05/04/2005. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details as well as a exploit are known.
After even before and not, there has been an exploit disclosed. It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 1100 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version 5.03 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at winamp.com. The best possible mitigation is suggested to be upgrading to the latest version. Attack attempts may be identified with Snort ID 2550. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 31734.
The vulnerability is also documented in the databases at X-Force (15727), SecurityFocus (BID 10045†), OSVDB (4944†), Secunia (SA11285†) and SecurityTracker (ID 1009660†). astalavista.ch is providing further details. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Support
Website
- Vendor: http://www.nullsoft.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.6
VulDB Base Score: 7.3
VulDB Temp Score: 6.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Heap-based overflowCWE: CWE-122 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: WinAmp 5.03
Patch: winamp.com
Snort ID: 2550
Snort Message: FILE-OTHER Nullsoft Winamp XM file buffer overflow attempt
Snort Class: 🔍
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
SourceFire IPS: 🔍
PaloAlto IPS: 🔍
Timeline
04/01/2001 🔍02/20/2004 🔍
04/05/2004 🔍
04/05/2004 🔍
04/05/2004 🔍
04/05/2004 🔍
04/05/2004 🔍
04/05/2004 🔍
11/30/2004 🔍
12/31/2004 🔍
05/04/2005 🔍
06/28/2019 🔍
Sources
Vendor: nullsoft.comAdvisory: nextgenss.com
Researcher: Peter Winter-Smith
Organization: NGSSoftware
Status: Confirmed
CVE: CVE-2004-1896 (🔍)
GCVE (CVE): GCVE-0-2004-1896
GCVE (VulDB): GCVE-100-581
X-Force: 15727 - Winamp in_mod.dll buffer overflow, High Risk
SecurityFocus: 10045 - NullSoft Winamp in_mod.dll Plug-in Heap Overflow Vulnerability
Secunia: 11285 - Winamp "in_mod.dll" Heap Overflow Vulnerability, Highly Critical
OSVDB: 4944 - Winamp Fasttracker 2 Plug-In in_mod.dll Overflow
SecurityTracker: 1009660
SecuriTeam: securiteam.com
Vulnerability Center: 6236 - Winamp 2.91 - 5.02 Allows Code Execution and DoS via in_mod.dl, High
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
Entry
Created: 04/05/2004 19:41Updated: 06/28/2019 07:15
Changes: 04/05/2004 19:41 (98), 06/28/2019 07:15 (1)
Complete: 🔍
Cache ID: 216:0D2:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.