Feeds

WinAmp's ‘malicious MP3’ vuln

All you need is an upgrade

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Users of NullSoft's popular WinAmp player should upgrade to version 2.80 (available here) to avoid a vulnerability reported on the BugTraq mailing list by Swedish security researcher Andreas Sandblad and confirmed by the company.

What we have here is a buffer overflow condition which can be exploited, with some difficulty, by using the ID3v2 tag which contains information about the audio file, such as artist, title, images, etc. It can also contain quite a bit more than that. Indeed, it can contain a separate file and can be as much as 256MB in total size.

WinAmp parses the tag's contents, and of course manipulation here is limited to what the parser is designed to accomplish. There's a lot that can't be done with this rig -- and there's probably a lot that isn't known about what can be done -- but do know that if the mini-browser is enabled, a malformed URL can cause a buffer overflow.

"If the mini-browser is enabled, Winamp will try to query a script on info.winamp.com for extra information about the song, based on data from the ID3v2 tag. The buffer overflow condition occurs when the URL string intended to be sent to the minibrowser is created. That means the buffer overflow occurs before any actual Internet connection to info.winamp.com is made," Sandblad says.

Creating the actual condition is fairly straightforward, but exploiting it isn't quite so easy. However it is possible to get to a memory address where considerable mischief can be done. This would include infecting other MP3 files on a drive or a network share. How long the blackhat development community will take to produce a handy exploitation tool is anyone's guess, but generally speaking they catch on very fast. Obviously it wouldn't hurt to upgrade from 2.79 to 2.80, since doing so is free and, we hope, painless. In lieu of that, a simple workaround is to disable the mini-browser.

Personally, I'd do both if I were using the product. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.