Winamp Flaw Allows AttacksBy Ryan Naraine | Posted 2004-11-24 Email Print
WEBINAR: Event Date: Tues, December 5, 2017 at 1:00 p.m. ET/10:00 a.m. PT
How Real-World Numbers Make the Case for SSDs in the Data Center REGISTER >
Security firm Secunia reports that a flaw in AOL's media player puts users at risk of remote code execution attacks. A malicious hacker could cause a buffer overflow in various ways.Users of America Online Inc.'s Winamp media player are at risk of remote code execution attacks because of a flaw in the software, according to a warning from a security research firm.
The flaw, which Secunia rates as "highly critical," has been reported in Winamp versions 5.05 and 5.06. Prior versions also may be affected.
Security-Assessment.com, which is credited with finding the vulnerability, said a malicious hacker could cause a buffer overflow in various ways, the most dangerous being through a malformed .m3u playlist file.
Secunia recommends that users disassociate ".cda" and ".m3u" extensions from Winamp until the vendor releases a fix.
News of the Winamp security issue comes amid reports that the last members of the original Winamp team have said goodbye to AOL. Only a few employees remain to prop up the once-ubiquitous digital audio player with minor updates, but no further improvements to Winamp are expected.
Winamp is maintained by AOL's Nullsoft division.
It is not the first time that security flaws have been flagged in Winamp. Earlier this year, Nullsoft rushed out a critical fix for a vulnerability found in the Winamp 3.0, 5.0 and 5.0 Pro versions.
That flaw was detected in the Winamp Skin installer mechanism and was being exploited to automatically launch spyware applications without user consent.
Check out eWEEK.com's for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.