January 30th, 2006, 06:59 PM
Winamp Zero-Day Exploit
I just saw the following advisory on SANS
Secunia has it as an Extremely Critical vulnerability.
While we're on the topic of audio software, there's a 0-day exploit out today for Winamp 5.12 that allows remote code execution via a crafted playlist (.pls) file. The proof-of-concept exploit suggests using an iframe to trigger a 'drive-by' attack on anyone unlucky enough to visit a website containing a malicious iframe; say, third-party advertisers and forum websites--the usual vectors for this sort of thing.
Secunia's got a nice writeup of it here.
Just a heads up! Watch yourselves!
If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.
- Sun Tzu
, The Art of War
January 30th, 2006, 07:21 PM
Thank you for the warning!
January 30th, 2006, 11:40 PM
And, the WinAmp update is available. See the web site above.
January 31st, 2006, 05:52 PM
Sorry about the double post, but Ed at ISC says:
Check it out at: http://isc.sans.org/
Update Jan 31: There's a sploit in the wild for this one. Have you patched yet? The kiddies will come a-callin' soon. --Ed.
Git 'er done!