HTTP: WinAmp MOD Header Overflow

This signature detects attempts to exploit a known vulnerability against WinAmp. Attackers can send maliciously crafted MOD file headers containing more than 20 bytes for the module name or tracker name to overflow the buffer in WinAmp and remotely execute code.

Extended Description

It has been reported that the Winamp 'in_mod.dll' plug-in is prone to a heap overflow vulnerability that may allow a remote attacker to cause the application to crash or possibly execute arbitrary code in order to gain unuauthorized access. The issue is reported to present itself due to insufficient boundary checks performed by the affected plug-in. Winamp versions 2.91 to 5.02 are reported to be prone to this issue. Older versions may be affected as well.

Affected Products

Nullsoft winamp

Short Name
HTTP:STC:WINAMP:MOD-HDR-OF
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2004-1896 Header MOD Overflow WinAmp bid:10045
Release Date
04/08/2004
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Nullsoft

CVSS Score

7.6

Found a potential security threat?