2nd November 2010
This post is a continuation of part 1 of Winamp 5.58 from Denial of Service to Code Execution.
The solution we used on the first Winamp in_mod_plugin exploit was not as elegant as we would like. First of all, it used a lot of code and secondly, the work that was required to change the shellcode was not a trivial undertaking. So in this post, we present a way to improve the second flaw and make this script kiddie friendly. (more…)