Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2011-3834
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple integer overflows in the in_avi.dll plugin in Winamp before 5.623 allow remote attackers to execute arbitrary code via an AVI file with a crafted value for (1) the number of streams or (2) the size of the RIFF INFO chunk, leading to a heap-based buffer overflow.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Winamp多个安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nullsoft Winamp是美国Nullsoft公司开发的一套免费的媒体播放器软件,现为美国在线(AOL)旗下产品之一。该软件支持多种媒体格式、皮肤更换和插件扩展等,同时也具备最基本的播放列表和媒体库功能。 Winamp中存在多个漏洞,恶意人员可利用该漏洞操控用户系统。 1)当分配使用了串流标头值的内存时,在in_avi.dll插件中的整数溢出错误可被利用通过特制的AVI文件导致基于堆的缓冲区溢出。 2)当分配使用RIFF INFO大小的值的内存时,在in_avi.dll插件中的整数溢出错误可被利用,
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2011-3834
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2011-3834
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2011-3834

No comments yet


Leave a comment