CVE-2009-3996
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
18/12/2009
Last modified:
09/04/2025
Description
Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nullsoft:winamp:*:*:*:*:*:*:*:* | 5.56 (including) | |
| cpe:2.3:a:nullsoft:winamp:0.20a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:0.92:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:1.006:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:1.90:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.5e:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.6x:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.7x:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.24:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nullsoft:winamp:2.50:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://forums.winamp.com/showthread.php?threadid=315355
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
- http://secunia.com/advisories/37495
- http://secunia.com/secunia_research/2009-55/
- http://secunia.com/secunia_research/2009-56/
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A151
- http://www.securityfocus.com/archive/1/508528/100/0/threaded
- http://www.securityfocus.com/bid/37374
- http://www.vupen.com/english/advisories/2009/3575
- http://www.vupen.com/english/advisories/2010/1107
- http://forums.winamp.com/showthread.php?threadid=315355
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
- http://secunia.com/advisories/37495
- http://secunia.com/secunia_research/2009-55/
- http://secunia.com/secunia_research/2009-56/
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A151
- http://www.securityfocus.com/archive/1/508528/100/0/threaded
- http://www.securityfocus.com/bid/37374
- http://www.vupen.com/english/advisories/2009/3575
- http://www.vupen.com/english/advisories/2010/1107



