{"vuid":"VU#449092","idnumber":"449092","name":"AOL Nullsoft Winamp Lyrics3 heap buffer overflow","keywords":["AOL","Nullsoft","Winamp","Ultravox","Lyrics3","heap-based","buffer overflow","Lyrics3 tags"],"overview":"AOL Nullsoft Winamp contains a heap-based buffer overflow in the code that handles Lyrics3 tags. This vulnerability may allow a remote, unauthenticated attacker execute arbitrary code on a vulnerable system.","clean_desc":"Lyrics3 is a system for embedding the lyrics inside an MP3 song file. AOL Nullsoft Winamp fails to properly handle malformed Lyrics3 tags, allowing a heap-based buffer overflow to occur. This vulnerability may be triggered by persuading a user to access a specially crafted playlist file or connect to a malicious server with Winamp.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.","resolution":"Upgrade \nThis vulnerability is addressed in AOL Nullsoft Winamp version 3.51.","workarounds":"Until it is possible to upgrade to AOL Nullsoft Winamp version 3.51, the following workarounds will help reduce the chances of exploitation: Disable Winamp playlist file association Disable the file association for Winamp playlist files to help prevent Windows applications from using Winamp to open playlists. This can be accomplished by deleting the following registry key: HKEY_CLASSES_ROOT\\Winamp.Playlist\nDisable Shoutcast and Ultravox protocols Links to malicious playlist files may be accessed using the Shoutcast (shout:) or Ultravox (uvox:) protocols. Disabling these protocols will reduce the chances of exploitation. This can be accomplished by deleting the following registry keys: HKEY_CLASSES_ROOT\\ICY\nHKEY_CLASSES_ROOT\\SC\nHKEY_CLASSES_ROOT\\SHOUT\nHKEY_CLASSES_ROOT\\UVOX\nDo not open Winamp playlist files Do not open Winamp playlist files (.PLS or .M3U) from untrusted sources.","sysaffected":"","thanks":"This vulnerability was reported by \niDEFENSE","author":"This document was written by Jeff Gennari.","public":["http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=432","http://www.winamp.com/player/version_history.php#5.31","http://www.winamp.com/player/index.php","http://secunia.com/advisories/22580/","http://www.id3.org/lyrics3.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-10-25T20:47:44Z","publicdate":"2006-10-25T00:00:00Z","datefirstpublished":"2006-10-27T00:02:43Z","dateupdated":"2006-12-08T19:16:39Z","revision":25,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"17","cam_impact":"19","cam_easeofexploitation":"11","cam_attackeraccessrequired":"18","cam_scorecurrent":"14.38965","cam_scorecurrentwidelyknown":"28.7793","cam_scorecurrentwidelyknownexploited":"52.76205","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":14.38965,"vulnote":null}