Secunia Research has discovered a vulnerability in Winamp, which can be exploited by malicious people to compromise a user’s system. The vulnerability is caused by a boundary error in the Module Decoder Plug-in (IN_MOD.DLL) when parsing samples and can be exploited to cause a heap-based buffer overflow via a specially crafted Impulse Tracker file. Successful exploitation may allow execution of arbitrary code.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83980/secunia-witsp.txt
Source: https://packetstormsecurity.com/files/83980/Winamp-Impulse-Tracker-Sample-Parsing-Buffer-Overflow.html

