Description
Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Yu Yang · textdoswindows
https://www.exploit-db.com/exploits/25061
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/18840
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/12381
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/13781
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110684140108614&w=2
Exploit x_refsource_misc
http://www.nsfocus.com/english/homepage/research/0501.htm
Various Sources x_refsource_confirm
http://www.winamp.com/player/version_history.php
Scores
EPSS
0.0663
EPSS Percentile
91.3%
Details
Status
published
Products (9)
nullsoft/winamp
5.0
nullsoft/winamp
5.01
nullsoft/winamp
5.02
nullsoft/winamp
5.03
nullsoft/winamp
5.04
nullsoft/winamp
5.05
nullsoft/winamp
5.06
nullsoft/winamp
5.07
nullsoft/winamp
5.08c
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026