![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.11530 |
Categoría: | Windows |
Título: | WinAMP3 buffer overflow |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is using WinAMP3, a popular media player which handles many files format (mp3, wavs and more...) This version has a buffer overflow which may allow an attacker to execute arbitrary code on this host, with the rights of the user running WinAMP. To perform an attack, the attack would have to send a malformed playlist (.b4s) to the user of this host who would then have to load it by double clicking on it. Since .b4s are XML-based files, most antivirus programs will let them in. Solution : Uninstall this software or upgrade to a version newer than 3.0 build 488 Risk factor : High |
Referencia Cruzada: |
BugTraq ID: 6515 Common Vulnerability Exposure (CVE) ID: CVE-2003-1272 http://www.securityfocus.com/bid/6515 BugTraq ID: 6516 http://www.securityfocus.com/bid/6516 Bugtraq: 20030104 WinAmp v.3.0: buffer overflow (Google Search) http://archives.neohapsis.com/archives/bugtraq/2003-01/0025.html XForce ISS Database: winamp-b4s-path-bo(10981) https://exchange.xforce.ibmcloud.com/vulnerabilities/10981 http://www.iss.net/security_center/static/10980.php |
Copyright | This script is Copyright (C) 2003 Tenable Network Security |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |