HTTP: WinAmp MOD Header Overflow
This signature detects attempts to exploit a known vulnerability against WinAmp. Attackers can send maliciously crafted MOD file headers containing more than 20 bytes for the module name or tracker name to overflow the buffer in WinAmp and remotely execute code.
Extended Description
It has been reported that the Winamp 'in_mod.dll' plug-in is prone to a heap overflow vulnerability that may allow a remote attacker to cause the application to crash or possibly execute arbitrary code in order to gain unuauthorized access. The issue is reported to present itself due to insufficient boundary checks performed by the affected plug-in. Winamp versions 2.91 to 5.02 are reported to be prone to this issue. Older versions may be affected as well.
Affected Products
Nullsoft winamp
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nullsoft
7.6