Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk.
The information has been provided by Julien Ahrens .
* Nullsoft Winamp 5.64 and previous
* Nullsoft Winamp 5.65 and later
Winamp is prone to multiple stack-based buffer-overflow vulnerabilities because the application fails to properly bound-check user-supplied data before copying it to an insufficiently sized memory buffer. Successful exploits allow attackers to execute arbitrary code with the privileges of the user running the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions.