Nullsoft Winamp before 5.24 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html | Broken Link |
http://securitytracker.com/id?1020582 | Third Party Advisory VDB Entry |
http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf | Third Party Advisory |
http://www.infobyte.com.ar/down/isr-evilgrade-1.0.0.tar.gz | Third Party Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15225 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2008-08-01T14:00:00
Updated: 2017-09-28T12:57:01
Reserved: 2008-08-01T00:00:00
Link: CVE-2008-3441
JSON object: View
NVD Information
Status : Analyzed
Published: 2008-08-01T14:41:00.000
Modified: 2018-11-01T15:10:48.033
Link: CVE-2008-3441
JSON object: View
Redhat Information
No data.
CWE