7.6
CVSSv2

CVE-2006-0476

Published: 31/01/2006 Updated: 19/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 780
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in Nullsoft Winamp 5.12 allows remote malicious users to execute arbitrary code via a playlist (pls) file with a long file name (File1 field).

Vulnerable Product Search on Vulmon Subscribe to Product

nullsoft winamp 5.12

Exploits

## # This file is part of the Metasploit Framework and may be redistributed # according to the licenses defined in the Authors field below In the # case of an unknown or missing license, this file defaults to the same # license as the core Framework (dual GPLv2 and Artistic) The latest # version of the Framework can always be obtained from metasp ...
#!/usr/bin/perl -w # =============================================================================================== # Winamp 512 Playlist UNC Path Computer Name Overflow Perl Exploit # By Umesh Wanve (umesh_345@yahoocom) # =============================================================================== ...
## # $Id: winamp_playlist_uncrb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' cl ...
/* * * Winamp 512 Remote Buffer Overflow Universal Exploit (Zero-Day) * Bug discovered & exploit coded by ATmaCA * Web: wwwspyinstructorscom && wwwatmacasoftcom * E-Mail: atmaca@icqmailcom * Credit to Kozan * */ /* * * Tested with : * Winamp 512 on Win XP Pro Sp2 * */ /* * Usage: * * Execute exploit, it will crea ...

Github Repositories

Winamp 5.12 UNC Path Buffer Overflow Exploit for Python

Winamp-512-Exploit Winamp 512 UNC Path Buffer Overflow Exploit for Python For preparing OSCE, I made a python script for CVE-2006-0476 exploit You can create your own payload with eg msfvenom -p windows/meterpreter/reverse_tcp LHOST=eth0 LPORT=4444 -a x86 --platform windows -f raw -e x86/alpha_mixed > payload You need to create your own payload Default one is bind sh