Critical vulnerabilities closed by Winamp update
With the release of version 5.63 of Winamp, Nullsoft, a division of AOL Music, has eliminated four critical security vulnerabilities in the media player. Three of these were heap-based buffer overflows in Winamp's bmp.w5s component that could have been exploited by an attacker to execute arbitrary code on a victim's system.
For an attack to be successful, a user must first open a specially crafted AVI file. It has been confirmed that the vulnerability affects version 5.622; other builds may also be affected. The update also addresses unspecified errors in the in_mod.dll module that could have been used to corrupt memory and could possibly result in arbitrary code being executed. Upgrading to Winamp 5.63, specifically build 3234 (188.8.131.5234), fixes these problems.
More details about Winamp 5.63, including non-security related changes and download links, are given in the forum release announcement and the version history. At the time of writing, the official download page still lists Winamp 5.623 as the current stable version.
- Winamp AVI / IT File Processing Vulnerabilities, security advisory from Secunia.