Vulnerability Details : CVE-2006-5567
Multiple heap-based buffer overflows in AOL Nullsoft WinAmp before 5.31 allow user-assisted remote attackers to execute arbitrary code via a crafted (1) ultravox-max-msg header to the Ultravox protocol handler or (2) unspecified Lyrics3 tags.
Vulnerability category: Execute code
Products affected by CVE-2006-5567
- cpe:2.3:a:nullsoft:winamp:5.24:*:*:*:*:*:*:*
- cpe:2.3:a:nullsoft:winamp:5.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5567
89.40%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5567
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2006-5567
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15686
-
http://securitytracker.com/id?1017120
Patch
-
http://www.winamp.com/player/version_history.php#5.31
-
http://securitytracker.com/id?1017119
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=432
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/449092
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/29807
-
http://www.vupen.com/english/advisories/2006/4196
-
http://www.securityfocus.com/bid/20744
Patch
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=431
Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/29804
Jump to