Vulnerability Details : CVE-2013-4694
Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-4694
Probability of exploitation activity in the next 30 days: 19.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-4694
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2013-4694
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4694
-
http://www.securitytracker.com/id/1030107
Winamp Buffer Overflow and Pointer Dereference Bugs Let Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.securityfocus.com/bid/60883
Winamp CVE-2013-4694 Multiple Stack Buffer Overflow VulnerabilitiesExploit
-
http://www.exploit-db.com/exploits/26558
Winamp 5.63 - Stack Buffer Overflow - Windows dos ExploitExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/85399
Winamp gen_jumpex.dll and ml_local.dll buffer overflow CVE-2013-4694 Vulnerability Report
-
http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html
WinAmp 5.63 Buffer Overflow ≈ Packet StormExploit
-
http://seclists.org/fulldisclosure/2013/Jul/4
Full Disclosure: [CVE-2013-4694] WinAmp v5.63 gen_jumpex.dll and ml_local.dll Multiple Buffer OverflowsExploit
-
http://forums.winamp.com/showthread.php?t=364291
Winamp 5.64 Released - Winamp & Shoutcast ForumsPatch;Vendor Advisory
-
https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695
WinAmp v5.64 Fixes Several Code Execution Vulnerabilities (CVE-2013-4694, CVE-2013-4695) - RCE SecurityExploit
-
http://packetstormsecurity.com/files/122978
WinAmp 5.63 Buffer Overflow ≈ Packet StormExploit
Products affected by CVE-2013-4694
- cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:2.91:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.03:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.04:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.01:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.06:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.05:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.07:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.08c:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.09:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.091:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.094:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.12:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.08d:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.08e:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.13:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.093:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:2.95:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.21:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.33:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.34:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.32:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.22:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.23:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.31:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.35:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.53:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.111:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.36:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.5:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.112:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.51:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.52:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.541:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.55:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.54:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.552:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.551:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.531:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:2.92:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.1:-:surround:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:1.006:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:1.90:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:0.20a:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:0.92:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.56:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.58:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.57:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.572:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.581:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.61:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.59:beta:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.54:beta:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.55:beta:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.51:beta:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.623:*:*:*:*:*:*:*