229 lines
No EOL
7.6 KiB
Text
229 lines
No EOL
7.6 KiB
Text
Inshell Security Advisory
|
||
http://www.inshell.net
|
||
|
||
|
||
1. ADVISORY INFORMATION
|
||
-----------------------
|
||
Product: WinAmp
|
||
Vendor URL: www.winamp.com
|
||
Type: Stack-based Buffer Overflow [CWE-121]
|
||
Date found: 2013-06-05
|
||
Date published: 2013-07-01
|
||
CVSSv2 Score: Bug #1: 7,5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
|
||
Bug #2: 3,7 (AV:L/AC:H/Au:N/C:P/I:P/A:P)
|
||
CVE: CVE-2013-4694
|
||
|
||
|
||
2. CREDITS
|
||
----------
|
||
These vulnerabilities were discovered and researched by Julien Ahrens
|
||
from Inshell Security.
|
||
|
||
|
||
3. VERSIONS AFFECTED
|
||
--------------------
|
||
WinAmp v5.63, older versions may be affected too.
|
||
|
||
|
||
4. VULNERABILITY DESCRIPTION (BUG #1)
|
||
-------------------------------------
|
||
The application loads the directories in %PROGRAMFILES%\WinAmp\Skins on
|
||
startup to determine the skins that have been installed and to list them
|
||
in the application menu point "Skins" and in the Skins Browser. But the
|
||
application does not properly validate the length of the directory name
|
||
before passing it as argument to a lstrcpynW call in the library
|
||
gen_jumpex.dll, which leads to a buffer overflow condition with possible
|
||
code execution.
|
||
|
||
This flaw is also exploitable via the %APPDATA%\WinAmp\winamp.ini. The
|
||
application loads the contents on startup, but does not properly
|
||
validate the length of the string loaded from the "skin" key before
|
||
passing it as an argument to the same lstrcpynW call in the library
|
||
gen_jumpex.dll, which leads to the same buffer overflow condition.
|
||
|
||
An attacker either needs to trick the victim to download and apply an
|
||
arbitrary skin package in order to exploit the vulnerability or to copy
|
||
an arbitrary winamp.ini into the %APPDATA%\WinAmp directory. Successful
|
||
exploits can allow attackers to execute arbitrary code with the
|
||
privileges of the user running the application. Failed exploits will
|
||
result in a denial-of-service condition.
|
||
|
||
|
||
4. VULNERABILITY DESCRIPTION (BUG #2)
|
||
-------------------------------------
|
||
The application loads the string of the GUI "Search" field from the
|
||
"WinAmp Library" when entered by a user and after switching to another
|
||
menu point, but does not properly validate the length of the string
|
||
before passing it as an argument to a GetDlgItemTextW call in the
|
||
library ml_local.dll, which leads to a buffer overflow condition with
|
||
possible code execution.
|
||
|
||
An attacker needs local access to the client in order to exploit the
|
||
vulnerability. Successful exploits can allow attackers to execute
|
||
arbitrary code with the privileges of the user running the application.
|
||
Failed exploits will result in a denial-of-service condition.
|
||
|
||
|
||
5. PROOF-OF-CONCEPT (DEBUG) (Bug #1)
|
||
------------------------------------
|
||
Registers:
|
||
EAX 3B3C08EB
|
||
ECX 7C80BAFC kernel32.7C80BAFC
|
||
EDX 00430010 winamp.00430010
|
||
EBX 0000007E
|
||
ESP 00C1F290 UNICODE "CCCCCCCCCCCCCCCCCCCCCCCCCCCC"
|
||
EBP 00430043 winamp.00430043
|
||
ESI 001961E8
|
||
EDI 0000060B
|
||
EIP 00430060 winamp.00430060
|
||
C 0 ES 0023 32bit 0(FFFFFFFF)
|
||
P 1 CS 001B 32bit 0(FFFFFFFF)
|
||
A 0 SS 0023 32bit 0(FFFFFFFF)
|
||
Z 1 DS 0023 32bit 0(FFFFFFFF)
|
||
S 0 FS 003B 32bit 7FFDE000(FFF)
|
||
T 0 GS 0000 NULL
|
||
D 0
|
||
O 0 LastErr ERROR_INVALID_WINDOW_HANDLE (00000578)
|
||
EFL 00010246 (NO,NB,E,BE,NS,PE,GE,LE)
|
||
ST0 empty +NaN
|
||
ST1 empty
|
||
ST2 empty
|
||
ST3 empty
|
||
ST4 empty
|
||
ST5 empty
|
||
ST6 empty
|
||
ST7 empty
|
||
3 2 1 0 E S P U O Z D I
|
||
FST 0120 Cond 0 0 0 1 Err 0 0 1 0 0 0 0 0 (LT)
|
||
FCW 027F Prec NEAR,53 Mask 1 1 1 1 1 1
|
||
|
||
Stackview:
|
||
ESP-20 > 00430043 CC winamp.00430043
|
||
ESP-1C > 0043004B KC winamp.0043004B
|
||
ESP-18 > 7C80BAFC kernel32.7C80BAFC
|
||
ESP-14 > 00430043 CC winamp.00430043
|
||
ESP-10 > 00430043 CC winamp.00430043
|
||
ESP-C > 00430043 CC winamp.00430043
|
||
ESP-8 > 00430043 CC winamp.00430043
|
||
ESP-4 > 00430043 CC winamp.00430043
|
||
ESP ==> > 00430043 CC winamp.00430043
|
||
ESP+4 > 00430043 CC winamp.00430043
|
||
ESP+8 > 00430043 CC winamp.00430043
|
||
ESP+C > 00430043 CC winamp.00430043
|
||
ESP+10 > 00430043 CC winamp.00430043
|
||
ESP+14 > 00430043 CC winamp.00430043
|
||
ESP+18 > 00430043 CC winamp.00430043
|
||
ESP+1C > 00430043 CC winamp.00430043
|
||
ESP+20 > 00430043 CC winamp.00430043
|
||
|
||
Vulnerable code part:
|
||
.text:1001A5B8 push eax ; lpString2
|
||
.text:1001A5B9 lea eax, [ebp+String1]
|
||
.text:1001A5BF push eax ; lpString1
|
||
.text:1001A5C0 call ds:lstrcpynW
|
||
.text:1001A5C6 cmp word ptr [ebp+wParam], si
|
||
.text:1001A5CD jnz short loc_1001A5E2
|
||
.text:1001A5CF mov dword_100310B4, 1
|
||
.text:1001A5D9 cmp [ebp+String1], si
|
||
.text:1001A5E0 jz short loc_1001A5E8
|
||
.text:1001A5E2
|
||
.text:1001A5E2 loc_1001A5E2: ; CODE XREF:
|
||
sub_1001A551+7Cj
|
||
.text:1001A5E2 mov dword_100310B4, esi
|
||
.text:1001A5E8
|
||
.text:1001A5E8 loc_1001A5E8: ; CODE XREF:
|
||
sub_1001A551+8Fj
|
||
.text:1001A5E8 pop esi
|
||
.text:1001A5E9 leave
|
||
.text:1001A5EA retn
|
||
.text:1001A5EA sub_1001A551 endp
|
||
|
||
|
||
5. PROOF-OF-CONCEPT (DEBUG) (Bug #2)
|
||
------------------------------------
|
||
Registers:
|
||
EAX 00000000
|
||
ECX 079A9D68 ml_local.079A9D68
|
||
EDX 00380608
|
||
EBX 00000000
|
||
ESP 00C1E46C UNICODE "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
|
||
EBP 00430043 winamp.00430043
|
||
ESI 00000000
|
||
EDI 00000000
|
||
EIP 00430043 winamp.00430043
|
||
C 0 ES 0023 32bit 0(FFFFFFFF)
|
||
P 1 CS 001B 32bit 0(FFFFFFFF)
|
||
A 0 SS 0023 32bit 0(FFFFFFFF)
|
||
Z 1 DS 0023 32bit 0(FFFFFFFF)
|
||
S 0 FS 003B 32bit 7FFDE000(FFF)
|
||
T 0 GS 0000 NULL
|
||
D 0
|
||
O 0 LastErr ERROR_INVALID_WINDOW_HANDLE (00000578)
|
||
EFL 00010246 (NO,NB,E,BE,NS,PE,GE,LE)
|
||
ST0 empty
|
||
ST1 empty
|
||
ST2 empty
|
||
ST3 empty
|
||
ST4 empty
|
||
ST5 empty
|
||
ST6 empty
|
||
ST7 empty
|
||
3 2 1 0 E S P U O Z D I
|
||
FST 0000 Cond 0 0 0 0 Err 0 0 0 0 0 0 0 0 (GT)
|
||
FCW 027F Prec NEAR,53 Mask 1 1 1 1 1 1
|
||
|
||
Stackview:
|
||
ESP-20 > 00430043 CC winamp.00430043
|
||
ESP-1C > 00430043 CC winamp.00430043
|
||
ESP-18 > 00430043 CC winamp.00430043
|
||
ESP-14 > 00430043 CC winamp.00430043
|
||
ESP-10 > 00430043 CC winamp.00430043
|
||
ESP-C > 00430043 CC winamp.00430043
|
||
ESP-8 > 00430043 CC winamp.00430043
|
||
ESP-4 > 00430043 CC winamp.00430043
|
||
ESP ==> > 00430043 CC winamp.00430043
|
||
ESP+4 > 00430043 CC winamp.00430043
|
||
ESP+8 > 00430043 CC winamp.00430043
|
||
ESP+C > 00430043 CC winamp.00430043
|
||
ESP+10 > 00430043 CC winamp.00430043
|
||
ESP+14 > 00430043 CC winamp.00430043
|
||
ESP+18 > 00430043 CC winamp.00430043
|
||
ESP+1C > 00430043 CC winamp.00430043
|
||
ESP+20 > 00430043 CC winamp.00430043
|
||
|
||
Vulnerable code part:
|
||
.text:07990871 lea eax, [ebp+WideCharStr]
|
||
.text:07990877 push eax ; lpString
|
||
.text:07990878 push 3EEh ; nIDDlgItem
|
||
.text:0799087D push [ebp+hDlg] ; hDlg
|
||
.text:07990880 call ds:GetDlgItemTextW
|
||
.text:07990886 lea eax, [ebp+WideCharStr]
|
||
[...]
|
||
.text:0799097C mov dword_79A9D68, eax
|
||
.text:07990981 mov dword_79A9D70, eax
|
||
.text:07990986 mov dword_79A9D6C, eax
|
||
.text:0799098B mov dword_79ACB54, eax
|
||
.text:07990990 pop ebx
|
||
.text:07990991 leave
|
||
.text:07990992 retn
|
||
|
||
|
||
6. SOLUTION
|
||
-----------
|
||
Update to latest version v5.64 or newer.
|
||
|
||
|
||
7. REPORT TIMELINE
|
||
------------------
|
||
2013-06-05: Discovery of the vulnerability
|
||
2013-06-06: Vendor acknowledgement of the issue
|
||
2013-06-11: Vendor already fixed this issue in v5.7 Beta build 3403
|
||
2013-06-12: Confirmation that the issue is fixed
|
||
2013-06-19: Vendor releases v5.64 which includes the fix
|
||
2013-07-01: Coordinated Disclosure
|
||
|
||
|
||
8. REFERENCES
|
||
-------------
|
||
http://security.inshell.net
|
||
http://forums.winamp.com/showthread.php?t=364291 |