exploit-db-mirror/exploits/windows/dos/20094.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

8 lines
No EOL
520 B
Text

source: https://www.securityfocus.com/bid/1496/info
The M3U Playlist file parser in NullSoft Winamp does not perform proper bounds checking with the extension "#EXTINF:". Therefore, entering a string consisting of over 280 characters in conjunction with this parameter will cause a buffer overflow condition which will either crash the application or allow for arbitrary code to be executed, depending on the data entered.
Cut and paste the following into a M3U file:
EXTM3U
#EXTINF:<string of of over 280 characters>