### [CVE-2013-4694](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4694) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Stack-based buffer overflow in gen_jumpex.dll in Winamp before 5.64 Build 3418 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a package with a long Skin directory name. NOTE: a second buffer overflow involving a long GUI Search field to ml_local.dll was also reported. However, since it is only exploitable by the user of the application, this issue would not cross privilege boundaries unless Winamp is running under a highly restricted environment such as a kiosk. ### POC #### Reference - http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html - http://packetstormsecurity.com/files/122239/WinAmp-5.63-Buffer-Overflow.html - http://packetstormsecurity.com/files/122978 - http://packetstormsecurity.com/files/122978 - http://seclists.org/fulldisclosure/2013/Jul/4 - http://seclists.org/fulldisclosure/2013/Jul/4 - http://www.exploit-db.com/exploits/26558 - http://www.exploit-db.com/exploits/26558 - https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 - https://www.rcesecurity.com/2013/07/winamp-v5-64-fixes-several-code-execution-vulnerabilities-cve-2013-4694-cve-2013-4695 #### Github - https://github.com/MrTuxracer/advisories