A vulnerability has been reported in Winamp, which can be exploited by malicious people to compromise a user's system. The problem is caused due to insufficient restrictions on Winamp skin zip files (.wsz). This can e.g. be exploited by a malicious website using a specially crafted Winamp skin to place and execute arbitrary programs. With Internet Explorer this can be done without user interaction.
An XML document in the Winamp skin zip file can reference a HTML document using the "browser" tag and get it to run in the "Local computer zone". This can be exploited to run an executable program embedded in the Winamp skin file using the "object" tag and the "codebase" attribute. The vulnerability has been confirmed on a fully patched system with Winamp 5.04 using Internet Explorer 6.0 on Microsoft Windows XP SP1.
NOTE: The vulnerability is reportedly being exploited in the wild. (Extremely critical)
Netscape Java Tab Spoofing Vulnerability
J. Courcoul has discovered a vulnerability in Netscape, which can be
exploited by malicious people to conduct phishing attacks.
The problem is caused due to errors in the displaying of Java applets
in a window when multiple tabs are used. This can be exploited to
spoof the content of a HTML document from another HTML document being
in a different tab.
The vulnerability has been confirmed in Netscape 7.2 on Mac OS X
Open untrusted sites in separate windows.
PROVIDED AND/OR DISCOVERED BY: