CVE-2009-4356
18.12.2009, 19:30
Multiple integer overflows in the jpeg.w5s and png.w5s filters in Winamp before 5.57 allow remote attackers to execute arbitrary code via malformed (1) JPEG or (2) PNG data in an MP3 file.Enginsight
Vendor | Product | Version |
---|---|---|
nullsoft | winamp | 𝑥 ≤ 5.56 |
nullsoft | winamp | 0.20a:a |
nullsoft | winamp | 0.92 |
nullsoft | winamp | 1.006 |
nullsoft | winamp | 1.90 |
nullsoft | winamp | 2.0 |
nullsoft | winamp | 2.4 |
nullsoft | winamp | 2.5e:e |
nullsoft | winamp | 2.6 |
nullsoft | winamp | 2.6x:x |
nullsoft | winamp | 2.7x:x |
nullsoft | winamp | 2.9 |
nullsoft | winamp | 2.10 |
nullsoft | winamp | 2.24 |
nullsoft | winamp | 2.50 |
nullsoft | winamp | 2.60 |
nullsoft | winamp | 2.60 |
nullsoft | winamp | 2.60 |
nullsoft | winamp | 2.61 |
nullsoft | winamp | 2.61 |
nullsoft | winamp | 2.62 |
nullsoft | winamp | 2.62 |
nullsoft | winamp | 2.64 |
nullsoft | winamp | 2.64 |
nullsoft | winamp | 2.65 |
nullsoft | winamp | 2.70 |
nullsoft | winamp | 2.70 |
nullsoft | winamp | 2.71 |
nullsoft | winamp | 2.72 |
nullsoft | winamp | 2.73 |
nullsoft | winamp | 2.73 |
nullsoft | winamp | 2.74 |
nullsoft | winamp | 2.75 |
nullsoft | winamp | 2.76 |
nullsoft | winamp | 2.77 |
nullsoft | winamp | 2.78 |
nullsoft | winamp | 2.79 |
nullsoft | winamp | 2.80 |
nullsoft | winamp | 2.81 |
nullsoft | winamp | 2.90 |
nullsoft | winamp | 2.91 |
nullsoft | winamp | 2.92 |
nullsoft | winamp | 2.95 |
nullsoft | winamp | 3.0 |
nullsoft | winamp | 3.1 |
nullsoft | winamp | 5.0 |
nullsoft | winamp | 5.0.1 |
nullsoft | winamp | 5.0.2 |
nullsoft | winamp | 5.01 |
nullsoft | winamp | 5.1 |
nullsoft | winamp | 5.1 |
nullsoft | winamp | 5.02 |
nullsoft | winamp | 5.2 |
nullsoft | winamp | 5.3 |
nullsoft | winamp | 5.03 |
nullsoft | winamp | 5.03a:a |
nullsoft | winamp | 5.04 |
nullsoft | winamp | 5.05 |
nullsoft | winamp | 5.5 |
nullsoft | winamp | 5.06 |
nullsoft | winamp | 5.07 |
nullsoft | winamp | 5.08 |
nullsoft | winamp | 5.08:c |
nullsoft | winamp | 5.08:d |
nullsoft | winamp | 5.08:e |
nullsoft | winamp | 5.08c:c |
nullsoft | winamp | 5.08d:d |
nullsoft | winamp | 5.08e:e |
nullsoft | winamp | 5.09 |
nullsoft | winamp | 5.11 |
nullsoft | winamp | 5.12 |
nullsoft | winamp | 5.13 |
nullsoft | winamp | 5.21 |
nullsoft | winamp | 5.22 |
nullsoft | winamp | 5.23 |
nullsoft | winamp | 5.24 |
nullsoft | winamp | 5.31 |
nullsoft | winamp | 5.32 |
nullsoft | winamp | 5.33 |
nullsoft | winamp | 5.34 |
nullsoft | winamp | 5.35 |
nullsoft | winamp | 5.36 |
nullsoft | winamp | 5.51 |
nullsoft | winamp | 5.52 |
nullsoft | winamp | 5.53 |
nullsoft | winamp | 5.54 |
nullsoft | winamp | 5.55 |
nullsoft | winamp | 5.091 |
nullsoft | winamp | 5.093 |
nullsoft | winamp | 5.094 |
nullsoft | winamp | 5.111 |
nullsoft | winamp | 5.112 |
nullsoft | winamp | 5.531 |
nullsoft | winamp | 5.541 |
nullsoft | winamp | 5.551 |
nullsoft | winamp | 5.552 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References