VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-1523
winamp: Multiple heap-based buffer overflows in vp6.w5s (ak...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1523

Original

Multiple heap-based buffer overflows in vp6.w5s (aka the VP6 codec) in Winamp before 5.59 Beta build 3033 might allow remote attackers to execute arbitrary code via a crafted VP6 (1) video file or (2) video stream.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-11-06
Source Information Category:
Advisory, Alert
Last Updated:
2010-11-08




Affected Product Tags
cpe:/a:nullsoft:winamp:0.20a
cpe:/a:nullsoft:winamp:0.92
cpe:/a:nullsoft:winamp:1.006
cpe:/a:nullsoft:winamp:1.90
cpe:/a:nullsoft:winamp:2.0
cpe:/a:nullsoft:winamp:2.10
cpe:/a:nullsoft:winamp:2.24
cpe:/a:nullsoft:winamp:2.4
cpe:/a:nullsoft:winamp:2.50
cpe:/a:nullsoft:winamp:2.5e
cpe:/a:nullsoft:winamp:2.6
cpe:/a:nullsoft:winamp:2.60
cpe:/a:nullsoft:winamp:2.60::full
cpe:/a:nullsoft:winamp:2.60::lite
cpe:/a:nullsoft:winamp:2.61
cpe:/a:nullsoft:winamp:2.61::full
cpe:/a:nullsoft:winamp:2.62
cpe:/a:nullsoft:winamp:2.62::standard
cpe:/a:nullsoft:winamp:2.64
cpe:/a:nullsoft:winamp:2.64::standard
cpe:/a:nullsoft:winamp:2.65
cpe:/a:nullsoft:winamp:2.6x
cpe:/a:nullsoft:winamp:2.70
cpe:/a:nullsoft:winamp:2.70::full
cpe:/a:nullsoft:winamp:2.71
cpe:/a:nullsoft:winamp:2.72
cpe:/a:nullsoft:winamp:2.73
cpe:/a:nullsoft:winamp:2.73::full
cpe:/a:nullsoft:winamp:2.74
cpe:/a:nullsoft:winamp:2.75
cpe:/a:nullsoft:winamp:2.76
cpe:/a:nullsoft:winamp:2.77
cpe:/a:nullsoft:winamp:2.78
cpe:/a:nullsoft:winamp:2.79
cpe:/a:nullsoft:winamp:2.7x
cpe:/a:nullsoft:winamp:2.80
cpe:/a:nullsoft:winamp:2.81
cpe:/a:nullsoft:winamp:2.9
cpe:/a:nullsoft:winamp:2.90
cpe:/a:nullsoft:winamp:2.91
cpe:/a:nullsoft:winamp:2.92
cpe:/a:nullsoft:winamp:2.95
cpe:/a:nullsoft:winamp:3.0
cpe:/a:nullsoft:winamp:3.1
cpe:/a:nullsoft:winamp:5.0
cpe:/a:nullsoft:winamp:5.0.1
cpe:/a:nullsoft:winamp:5.0.2
cpe:/a:nullsoft:winamp:5.01
cpe:/a:nullsoft:winamp:5.02
cpe:/a:nullsoft:winamp:5.03
cpe:/a:nullsoft:winamp:5.03a
cpe:/a:nullsoft:winamp:5.04
cpe:/a:nullsoft:winamp:5.05
cpe:/a:nullsoft:winamp:5.06
cpe:/a:nullsoft:winamp:5.07
cpe:/a:nullsoft:winamp:5.08
cpe:/a:nullsoft:winamp:5.08:c
cpe:/a:nullsoft:winamp:5.08:d
cpe:/a:nullsoft:winamp:5.08:e
cpe:/a:nullsoft:winamp:5.08c
cpe:/a:nullsoft:winamp:5.08d
cpe:/a:nullsoft:winamp:5.08e
cpe:/a:nullsoft:winamp:5.09
cpe:/a:nullsoft:winamp:5.091
cpe:/a:nullsoft:winamp:5.093
cpe:/a:nullsoft:winamp:5.094
cpe:/a:nullsoft:winamp:5.1
cpe:/a:nullsoft:winamp:5.11
cpe:/a:nullsoft:winamp:5.111
cpe:/a:nullsoft:winamp:5.112
cpe:/a:nullsoft:winamp:5.12
cpe:/a:nullsoft:winamp:5.13
cpe:/a:nullsoft:winamp:5.1:-:surround
cpe:/a:nullsoft:winamp:5.2
cpe:/a:nullsoft:winamp:5.21
cpe:/a:nullsoft:winamp:5.22
cpe:/a:nullsoft:winamp:5.23
cpe:/a:nullsoft:winamp:5.24
cpe:/a:nullsoft:winamp:5.3
cpe:/a:nullsoft:winamp:5.31
cpe:/a:nullsoft:winamp:5.32
cpe:/a:nullsoft:winamp:5.33
cpe:/a:nullsoft:winamp:5.34
cpe:/a:nullsoft:winamp:5.35
cpe:/a:nullsoft:winamp:5.36
cpe:/a:nullsoft:winamp:5.5
cpe:/a:nullsoft:winamp:5.51
cpe:/a:nullsoft:winamp:5.52
cpe:/a:nullsoft:winamp:5.53
cpe:/a:nullsoft:winamp:5.531
cpe:/a:nullsoft:winamp:5.54
cpe:/a:nullsoft:winamp:5.541
cpe:/a:nullsoft:winamp:5.55
cpe:/a:nullsoft:winamp:5.551
cpe:/a:nullsoft:winamp:5.552
cpe:/a:nullsoft:winamp:5.56
cpe:/a:nullsoft:winamp:5.57
cpe:/a:nullsoft:winamp:5.58 and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
Partial [?]
X Complete [?]

Alternatives




References
BUGTRAQ 20101027 Secunia Research: Winamp VP6 Content Parsing Buffer Overflow Vulnerability




CONFIRM http://forums.winamp.com/showthread.php?t=322995




MISC http://secunia.com/secunia_research/2010-95/




Vulnerability Type Buffer Errors (CWE-119)





Copyright © 2010 JPCERT/CC All Rights Reserved.