Vulnerabilites related to winace - winace
Vulnerability from fkie_nvd
Published
2005-08-26 15:50
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name.
Impacted products
Vendor Product Version
winace winace 2.6.0.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "65352B0F-D752-4814-92E9-CB0769E66EAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name."
    }
  ],
  "id": "CVE-2005-2694",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-26T15:50:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
Impacted products
Vendor Product Version
winace winace 2.5
winace winace 2.6.0.5
winace winace 2.60



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC96B1C-CFD0-4752-896C-5EE0A43397DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:winace:winace:2.6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "65352B0F-D752-4814-92E9-CB0769E66EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:winace:winace:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8B82379-9F04-41E6-BCFE-34E7507C610F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
    },
    {
      "lang": "es",
      "value": "WinAce permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) mediante un archivo ZOO con una estructura de entrada de directorio (direntry structure) que apunta a un fichero anterior."
    }
  ],
  "id": "CVE-2007-2535",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-09T01:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/41750"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/41750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-02-24 11:02
Modified
2025-04-03 01:03
Severity ?
Summary
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
Impacted products
Vendor Product Version
winace winace 2.60



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8B82379-9F04-41E6-BCFE-34E7507C610F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive."
    }
  ],
  "id": "CVE-2006-0813",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2006-02-24T11:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17251"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-67/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015672"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23383"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16786"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0709"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-67/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-09-08 10:03
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=112621008228458&w=2
cve@mitre.orghttp://secunia.com/advisories/16479Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19454Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19458Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19581Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19596
cve@mitre.orghttp://secunia.com/advisories/19612
cve@mitre.orghttp://secunia.com/advisories/19834Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19890Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19931
cve@mitre.orghttp://secunia.com/advisories/19938Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19939
cve@mitre.orghttp://secunia.com/advisories/19967Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19975Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19977Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20009Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20270
cve@mitre.orghttp://secunia.com/secunia_research/2005-41/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-27/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-32/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-46/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-50/advisory/
cve@mitre.orghttp://securityreason.com/securityalert/49
cve@mitre.orghttp://securitytracker.com/id?1014863
cve@mitre.orghttp://securitytracker.com/id?1015852
cve@mitre.orghttp://securitytracker.com/id?1016011
cve@mitre.orghttp://securitytracker.com/id?1016012
cve@mitre.orghttp://securitytracker.com/id?1016065
cve@mitre.orghttp://securitytracker.com/id?1016066
cve@mitre.orghttp://securitytracker.com/id?1016088
cve@mitre.orghttp://securitytracker.com/id?1016114
cve@mitre.orghttp://securitytracker.com/id?1016115
cve@mitre.orghttp://securitytracker.com/id?1016177
cve@mitre.orghttp://securitytracker.com/id?1016257
cve@mitre.orghttp://securitytracker.com/id?1016512
cve@mitre.orghttp://www.osvdb.org/25129
cve@mitre.orghttp://www.securityfocus.com/archive/1/432357/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/432579/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433258/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433352/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433693/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434011/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434234/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434279/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/436639/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440303/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/14759
cve@mitre.orghttp://www.securityfocus.com/bid/19884
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1565
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1577
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1611
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1681
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1694
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1725
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1775
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1797
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1835
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1836
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2047
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2184
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2824
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3495
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26116
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26142
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26168
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26272
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26302
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26315
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26385
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26447
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26479
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26480
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26736
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26982
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27763
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28787
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=112621008228458&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16479Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19454Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19458Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19581Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19596
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19834Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19890Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19931
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19938Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19939
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19967Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19975Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19977Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20009Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20270
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2005-41/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-27/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-32/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-46/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-50/advisory/
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/49
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014863
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015852
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016011
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016012
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016065
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016066
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016088
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016114
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016115
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016177
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016257
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016512
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25129
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432357/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432579/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433258/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433352/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433693/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434011/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434234/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434279/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/436639/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440303/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14759
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19884
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1565
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1577
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1611
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1681
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1694
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1725
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1775
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1797
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1835
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1836
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2184
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2824
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3495
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26116
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26142
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26168
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26272
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26302
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26315
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26385
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26447
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26479
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26480
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26736
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26982
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27763
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28787
Impacted products
Vendor Product Version
winace winace 2.6.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D2B1B2-B49D-4F22-B4C6-CE0FAF0FDF35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
    }
  ],
  "id": "CVE-2005-2856",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-09-08T10:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16479"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19454"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19458"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19581"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19596"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19612"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19834"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19890"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19931"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19938"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19939"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19967"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19975"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19977"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20009"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20270"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2005-41/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-24/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-25/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-27/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-28/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-29/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-30/advisory"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-32/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-33/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-36/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-38/advisory"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-46/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-50/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/49"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014863"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015852"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016012"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016066"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016088"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016114"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016115"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016177"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016257"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016512"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/25129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14759"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19884"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1565"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1577"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1611"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1681"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1694"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1725"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1775"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1797"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1835"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1836"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2824"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3495"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19458"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19931"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2005-41/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-24/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-25/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-27/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-28/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-29/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-30/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-32/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-33/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-36/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-38/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-46/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-50/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/49"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016512"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1775"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
Impacted products
Vendor Product Version
amavis amavis *
avast avast_antivirus *
avast avast_antivirus 4.6.394
avast avast_antivirus 4.7.652
avast avast_antivirus 4.7.700
avast avast_antivirus_home 4.0
avast avast_antivirus_home 4.6
avast avast_antivirus_home 4.6.652
avast avast_antivirus_home 4.6.655
avast avast_antivirus_home 4.6.665
avast avast_antivirus_home 4.6.691
avast avast_antivirus_home 4.7.827
avast avast_antivirus_home 4.7.827
avast avast_antivirus_home 4.7.844
avast avast_antivirus_home 4.7.844
avast avast_antivirus_home 4.7.869
avast avast_antivirus_home 4.7.869
avast avast_antivirus_home 4.7.1043
avast avast_antivirus_home 4.7.1043
avast avast_antivirus_home 4.7.1098
avast avast_antivirus_home 4.7.1098
avast avast_antivirus_professional 4.0
avast avast_antivirus_professional 4.6
avast avast_antivirus_professional 4.6.603
avast avast_antivirus_professional 4.6.652
avast avast_antivirus_professional 4.6.665
avast avast_antivirus_professional 4.6.691
avast avast_antivirus_professional 4.7.827
avast avast_antivirus_professional 4.7.827
avast avast_antivirus_professional 4.7.844
avast avast_antivirus_professional 4.7.844
avast avast_antivirus_professional 4.7.869
avast avast_antivirus_professional 4.7.1043
avast avast_antivirus_professional 4.7.1043
avast avast_antivirus_professional 4.7.1098
avira antivir *
avira antivir 6.35.00.00
avira antivir 7.04.00.23
avira antivir_personal *
avira antivir_personal *
avira antivir_personal *
avira antivir_personal *
avira antivir_personal 7
avira antivir_personal 7
panda panda_antivirus 2007
panda panda_antivirus_and_firewall 2007
picozip picozip *
rahul_dhesi zoo *
unzoo unzoo 4.4
winace winace *
barracuda_networks barracuda_spam_firewall *
barracuda_networks barracuda_spam_firewall model_100
barracuda_networks barracuda_spam_firewall model_200
barracuda_networks barracuda_spam_firewall model_300
barracuda_networks barracuda_spam_firewall model_400
barracuda_networks barracuda_spam_firewall model_500
barracuda_networks barracuda_spam_firewall model_600
barracuda_networks barracuda_spam_firewall model_800
barracuda_networks barracuda_spam_firewall model_900



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "64AF6FAE-B025-4F70-9F52-C7C12C6F705D",
              "versionEndIncluding": "2.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC3BF13-2946-411E-93A5-0C3AF0508C60",
              "versionEndIncluding": "4.7.980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:4.6.394:*:*:*:*:*:*:*",
              "matchCriteriaId": "8683D747-C092-4841-AABF-280D7EB771F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.652:*:*:*:*:*:*:*",
              "matchCriteriaId": "D393356E-0464-41B6-9D56-2DCFC6900244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.700:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED7C89E-E28B-4BE9-952D-86A8D089B41D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1519A450-8F71-408A-81B8-AA6F337E7A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48872452-2B26-44C4-A9FF-0D9D23AAC95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.652:*:*:*:*:*:*:*",
              "matchCriteriaId": "275D7948-61FB-4415-A9EB-59EEF9757149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.655:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CCC4081-D877-4DE3-9342-59BCE7C41CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.665:*:*:*:*:*:*:*",
              "matchCriteriaId": "B189DFCB-2307-43B4-8102-BA725CEE0711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.691:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C733E69-33B3-465B-B146-A68C26373E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF16A3D-BC29-4426-BDF5-F1C6E85228B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*",
              "matchCriteriaId": "33A71A2C-36AC-4F36-9D94-AA824F4DE14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02983BB-F027-4967-A230-933299D2D061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*",
              "matchCriteriaId": "62618C12-3EAC-4434-B2A8-D83612F1A05C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:*:*:*:*:*:*",
              "matchCriteriaId": "238FB2B1-41CF-46DB-8ED7-7F2B6609C27D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*",
              "matchCriteriaId": "B949535B-9771-4AC6-BBDB-8BB3A789A1FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:*:*:*:*:*:*",
              "matchCriteriaId": "97FEA351-FFF6-4452-9A2B-A7AAF4D7EE20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*",
              "matchCriteriaId": "DC6DA89A-BF71-4031-9B51-E5941FDE5E15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:*:*:*:*:*:*",
              "matchCriteriaId": "18837F1C-8ECD-4202-9489-08D63FB28CDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*",
              "matchCriteriaId": "DB201D49-EB74-4A5D-B641-86C4429E3EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "231DDF5E-5026-4844-8374-45F0926F8C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8822D55C-FEE7-41B5-A8D5-8D9F514CF815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.603:*:*:*:*:*:*:*",
              "matchCriteriaId": "B89C0CA4-00DE-4CAD-B554-36C46815A919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.652:*:*:*:*:*:*:*",
              "matchCriteriaId": "A618B922-80E7-4769-90BA-5FE231DA6B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.665:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F19B83-BAD9-4CDC-95C5-6D352F223AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.691:*:*:*:*:*:*:*",
              "matchCriteriaId": "762B6C23-5ADD-4221-8146-DF9CE95637BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3B1651-DC3E-43B8-A5A4-8BEF7D668EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*",
              "matchCriteriaId": "DF2D8C10-01E4-43D7-93EE-342BA7E9C489",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D0980CA-26A4-468E-82F3-E03953250343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*",
              "matchCriteriaId": "AAB7888A-E884-4C73-AF10-698C56E080F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.869:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF5B2325-D8EE-4D1E-8291-740726FC1EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0EF168-1F0D-4772-8922-0A75CAF28661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*",
              "matchCriteriaId": "1F7F2957-4422-4891-B573-F68882D7C8E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAED694-2497-488B-A2AB-0781501678F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDD00670-7EC0-4AA4-98EF-C8AE38330284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C23C179C-B50E-4F47-BFFA-85848131C99D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:7.04.00.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C813AD8-5D73-41DF-B710-3CEB20FB9EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*",
              "matchCriteriaId": "5DB520B5-36E8-4F4B-99FF-0FF3F708CC8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*",
              "matchCriteriaId": "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD267D52-D580-4460-AFF9-E5BA478A98FA",
              "versionEndIncluding": "7.3.0.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D94528-A54F-439B-8584-57A82CDF7318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*",
              "matchCriteriaId": "DB66A5A4-6758-438D-9155-7475A5406DA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:panda:panda_antivirus:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F9AF4F-E974-4D6F-AF51-0DA7A59E64FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:panda:panda_antivirus_and_firewall:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DBEED1-0648-45F3-AFC2-91C872A1B098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:picozip:picozip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AD36471-D8DC-4B11-B53B-264AB1560063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79845C9F-7884-4F77-B492-4A944D3DCCEA",
              "versionEndIncluding": "2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unzoo:unzoo:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93C2E82-03E5-42CE-A589-B82FBCBE7D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF7B6EE8-25D5-4C89-A0B8-A069D330A9D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D03D666-D234-4626-82F9-EC5726BE1920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_100:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0BEEFB2-C6ED-43D5-B535-623931C38890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_200:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2ECF7F8-A29F-4868-9DE5-4227E5DA2285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_300:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A897043-9003-4F27-8C7D-AE6B2BD0389C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_400:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F05FEF8-6B34-4874-AD6B-A053415BD939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_500:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28FAD61-3723-4CCC-B890-C5869E7AC3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_600:*:*:*:*:*:*:*",
              "matchCriteriaId": "7697AAC2-EC8A-496E-9336-29AAE61CD69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_800:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA47F3A-44BA-4011-8A44-1AE54D02E772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_900:*:*:*:*:*:*:*",
              "matchCriteriaId": "423620AD-EA6A-4730-B97A-DF67247372BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
    },
    {
      "lang": "es",
      "value": "El archivo unzoo.c, tal como se utiliza en varios productos, incluyendo AMaViS versi\u00f3n 2.4.1 y anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito) por medio de un archivo ZOO con una estructura direntry que apunta hacia un archivo anterior."
    }
  ],
  "evaluatorSolution": "http://xforce.iss.net/xforce/xfdb/34080\r\n\r\n\r\nFor Barracuda Spam Firewall:\r\nUpgrade to the latest virus definition version of Barracuda Spam Firewall (virusdef 2.0.6399 for 3.4 and after or virusdef 2.0.6399o for prior to 3.4), available from the automatic update.\r\n\r\nFor Panda Software Antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4/2/2007 or later), available from the automatic update feature.\r\n\r\nFor avast! antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4.7.981 or later), available from the avast! antivirus Web site. See references.\r\n\r\nFor Avira AntiVir:\r\nUpgrade to the latest version of Avira AntiVir (avpack32.dll version 7.3.0.6 or later), available from the automatic update feature.\r\n\r\nFor AMaViS:\r\nRefer to ASA-2007-2 for patch, upgrade, or suggested workaround information. See References.",
  "id": "CVE-2007-1673",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-09T01:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36208"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25315"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.amavis.org/security/asa-2007-2.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.amavis.org/security/asa-2007-2.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-28 00:46
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive.
Impacted products
Vendor Product Version
winace winace *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36B6D02-34DC-47CA-836C-18429D7F7C08",
              "versionEndIncluding": "2.65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en WinAce 2.65 y versiones anteriores, y posiblemente otras versiones anteriores a 2.69, permite a atacantes remotos con la complicidad del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante un nombre de fichero largo en un archivo comprimido UUE."
    }
  ],
  "id": "CVE-2007-6563",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-12-28T00:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/40267"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28215"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27017"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/4312"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/40267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28215"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2007-1673 (GCVE-0-2007-1673)
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:06
Severity ?
CWE
  • n/a
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
http://www.amavis.org/security/asa-2007-2.txt x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080 vdb-entry, x_refsource_XF
http://osvdb.org/36208 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/23823 vdb-entry, x_refsource_BID
http://secunia.com/advisories/25315 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/467646/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://securityreason.com/securityalert/2680 third-party-advisory, x_refsource_SREASON
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:06:25.976Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.amavis.org/security/asa-2007-2.txt"
          },
          {
            "name": "multiple-vendor-zoo-dos(34080)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
          },
          {
            "name": "36208",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36208"
          },
          {
            "name": "23823",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23823"
          },
          {
            "name": "25315",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25315"
          },
          {
            "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
          },
          {
            "name": "2680",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2680"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.amavis.org/security/asa-2007-2.txt"
        },
        {
          "name": "multiple-vendor-zoo-dos(34080)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
        },
        {
          "name": "36208",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36208"
        },
        {
          "name": "23823",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23823"
        },
        {
          "name": "25315",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25315"
        },
        {
          "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
        },
        {
          "name": "2680",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2680"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1673",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.amavis.org/security/asa-2007-2.txt",
              "refsource": "CONFIRM",
              "url": "http://www.amavis.org/security/asa-2007-2.txt"
            },
            {
              "name": "multiple-vendor-zoo-dos(34080)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
            },
            {
              "name": "36208",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36208"
            },
            {
              "name": "23823",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23823"
            },
            {
              "name": "25315",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25315"
            },
            {
              "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
            },
            {
              "name": "2680",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2680"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1673",
    "datePublished": "2007-05-09T01:00:00",
    "dateReserved": "2007-03-24T00:00:00",
    "dateUpdated": "2024-08-07T13:06:25.976Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2856 (GCVE-0-2005-2856)
Vulnerability from cvelistv5
Published
2005-09-08 04:00
Modified
2024-08-07 22:53
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/26982 vdb-entry, x_refsource_XF
http://securitytracker.com/id?1016512 vdb-entry, x_refsource_SECTRACK
http://secunia.com/secunia_research/2006-24/advisory x_refsource_MISC
http://www.vupen.com/english/advisories/2006/2824 vdb-entry, x_refsource_VUPEN
http://securityreason.com/securityalert/49 third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/19884 vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/26479 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/1797 vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/434279/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://securitytracker.com/id?1014863 vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1016011 vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1016115 vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/19939 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-46/advisory/ x_refsource_MISC
http://securitytracker.com/id?1016065 vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/1835 vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1016088 vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/3495 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/19967 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-27/ x_refsource_MISC
http://securitytracker.com/id?1016177 vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1016114 vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/26272 vdb-entry, x_refsource_XF
http://secunia.com/secunia_research/2006-50/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/432579/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19931 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-36/advisory x_refsource_MISC
http://secunia.com/secunia_research/2006-28/advisory x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/26447 vdb-entry, x_refsource_XF
http://secunia.com/advisories/19975 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1775 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/16479 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26385 vdb-entry, x_refsource_XF
https://exchange.xforce.ibmcloud.com/vulnerabilities/26116 vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/436639/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/1611 vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1681 vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/433693/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/2184 vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1577 vdb-entry, x_refsource_VUPEN
http://secunia.com/secunia_research/2006-33/advisory/ x_refsource_MISC
http://secunia.com/secunia_research/2006-29/advisory/ x_refsource_MISC
http://www.securityfocus.com/archive/1/434234/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19938 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19581 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26302 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/1694 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/20270 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19890 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19977 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26142 vdb-entry, x_refsource_XF
http://secunia.com/secunia_research/2006-38/advisory x_refsource_MISC
http://secunia.com/advisories/19596 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2005-41/advisory/ x_refsource_MISC
http://securitytracker.com/id?1016066 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/440303/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19458 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-25/advisory x_refsource_MISC
http://securitytracker.com/id?1016012 vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/26736 vdb-entry, x_refsource_XF
http://secunia.com/secunia_research/2006-32/advisory/ x_refsource_MISC
http://secunia.com/advisories/19454 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/433258/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/secunia_research/2006-30/advisory x_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/26315 vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/432357/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/25129 vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/27763 vdb-entry, x_refsource_XF
http://secunia.com/advisories/19834 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/434011/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/28787 vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/433352/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/20009 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26480 vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/2047 vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/26168 vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/14759 vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2006/1836 vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1016257 vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/19612 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1565 vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1725 vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1015852 vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=112621008228458&w=2 mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:53:28.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "automate-unacev2-bo(26982)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
          },
          {
            "name": "1016512",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016512"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-24/advisory"
          },
          {
            "name": "ADV-2006-2824",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2824"
          },
          {
            "name": "49",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/49"
          },
          {
            "name": "19884",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19884"
          },
          {
            "name": "eazel-ztvunacev2-bo(26479)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
          },
          {
            "name": "ADV-2006-1797",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1797"
          },
          {
            "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
          },
          {
            "name": "1014863",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014863"
          },
          {
            "name": "1016011",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016011"
          },
          {
            "name": "1016115",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016115"
          },
          {
            "name": "19939",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19939"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-46/advisory/"
          },
          {
            "name": "1016065",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016065"
          },
          {
            "name": "ADV-2006-1835",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1835"
          },
          {
            "name": "1016088",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016088"
          },
          {
            "name": "ADV-2006-3495",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3495"
          },
          {
            "name": "19967",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19967"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-27/"
          },
          {
            "name": "1016177",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016177"
          },
          {
            "name": "1016114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016114"
          },
          {
            "name": "powerarchiver-unacev2-ace-bo(26272)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-50/advisory/"
          },
          {
            "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
          },
          {
            "name": "19931",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19931"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-36/advisory"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-28/advisory"
          },
          {
            "name": "filzip-unacev2-bo(26447)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
          },
          {
            "name": "19975",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19975"
          },
          {
            "name": "ADV-2006-1775",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1775"
          },
          {
            "name": "16479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16479"
          },
          {
            "name": "ultimatezip-unacev2-bo(26385)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
          },
          {
            "name": "servant-salamander-unacev2-bo(26116)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
          },
          {
            "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
          },
          {
            "name": "ADV-2006-1611",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1611"
          },
          {
            "name": "ADV-2006-1681",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1681"
          },
          {
            "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
          },
          {
            "name": "ADV-2006-2184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2184"
          },
          {
            "name": "ADV-2006-1577",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1577"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-33/advisory/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-29/advisory/"
          },
          {
            "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
          },
          {
            "name": "19938",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19938"
          },
          {
            "name": "19581",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19581"
          },
          {
            "name": "antitrojan-unacev2-bo(26302)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
          },
          {
            "name": "ADV-2006-1694",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1694"
          },
          {
            "name": "20270",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20270"
          },
          {
            "name": "19890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19890"
          },
          {
            "name": "19977",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19977"
          },
          {
            "name": "winhki-unacev2-bo(26142)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-38/advisory"
          },
          {
            "name": "19596",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19596"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-41/advisory/"
          },
          {
            "name": "1016066",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016066"
          },
          {
            "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
          },
          {
            "name": "19458",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19458"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-25/advisory"
          },
          {
            "name": "1016012",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016012"
          },
          {
            "name": "risingantivirus-unacev2-bo(26736)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-32/advisory/"
          },
          {
            "name": "19454",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19454"
          },
          {
            "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-30/advisory"
          },
          {
            "name": "whereisit-unacev2-bo(26315)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
          },
          {
            "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
          },
          {
            "name": "25129",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25129"
          },
          {
            "name": "bitzipper-unacev2-bo(27763)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
          },
          {
            "name": "19834",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19834"
          },
          {
            "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
          },
          {
            "name": "tziptv-unacev2-bo(28787)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
          },
          {
            "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
          },
          {
            "name": "20009",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20009"
          },
          {
            "name": "izarc-unacev2-bo(26480)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
          },
          {
            "name": "ADV-2006-2047",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2047"
          },
          {
            "name": "extractnow-unacev2-ace-bo(26168)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
          },
          {
            "name": "14759",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14759"
          },
          {
            "name": "ADV-2006-1836",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1836"
          },
          {
            "name": "1016257",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016257"
          },
          {
            "name": "19612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19612"
          },
          {
            "name": "ADV-2006-1565",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1565"
          },
          {
            "name": "ADV-2006-1725",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1725"
          },
          {
            "name": "1015852",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015852"
          },
          {
            "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "automate-unacev2-bo(26982)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
        },
        {
          "name": "1016512",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016512"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-24/advisory"
        },
        {
          "name": "ADV-2006-2824",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2824"
        },
        {
          "name": "49",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/49"
        },
        {
          "name": "19884",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19884"
        },
        {
          "name": "eazel-ztvunacev2-bo(26479)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
        },
        {
          "name": "ADV-2006-1797",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1797"
        },
        {
          "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
        },
        {
          "name": "1014863",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014863"
        },
        {
          "name": "1016011",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016011"
        },
        {
          "name": "1016115",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016115"
        },
        {
          "name": "19939",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19939"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-46/advisory/"
        },
        {
          "name": "1016065",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016065"
        },
        {
          "name": "ADV-2006-1835",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1835"
        },
        {
          "name": "1016088",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016088"
        },
        {
          "name": "ADV-2006-3495",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3495"
        },
        {
          "name": "19967",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19967"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-27/"
        },
        {
          "name": "1016177",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016177"
        },
        {
          "name": "1016114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016114"
        },
        {
          "name": "powerarchiver-unacev2-ace-bo(26272)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-50/advisory/"
        },
        {
          "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
        },
        {
          "name": "19931",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19931"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-36/advisory"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-28/advisory"
        },
        {
          "name": "filzip-unacev2-bo(26447)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
        },
        {
          "name": "19975",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19975"
        },
        {
          "name": "ADV-2006-1775",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1775"
        },
        {
          "name": "16479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16479"
        },
        {
          "name": "ultimatezip-unacev2-bo(26385)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
        },
        {
          "name": "servant-salamander-unacev2-bo(26116)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
        },
        {
          "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
        },
        {
          "name": "ADV-2006-1611",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1611"
        },
        {
          "name": "ADV-2006-1681",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1681"
        },
        {
          "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
        },
        {
          "name": "ADV-2006-2184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2184"
        },
        {
          "name": "ADV-2006-1577",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1577"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-33/advisory/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-29/advisory/"
        },
        {
          "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
        },
        {
          "name": "19938",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19938"
        },
        {
          "name": "19581",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19581"
        },
        {
          "name": "antitrojan-unacev2-bo(26302)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
        },
        {
          "name": "ADV-2006-1694",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1694"
        },
        {
          "name": "20270",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20270"
        },
        {
          "name": "19890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19890"
        },
        {
          "name": "19977",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19977"
        },
        {
          "name": "winhki-unacev2-bo(26142)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-38/advisory"
        },
        {
          "name": "19596",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19596"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-41/advisory/"
        },
        {
          "name": "1016066",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016066"
        },
        {
          "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
        },
        {
          "name": "19458",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19458"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-25/advisory"
        },
        {
          "name": "1016012",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016012"
        },
        {
          "name": "risingantivirus-unacev2-bo(26736)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-32/advisory/"
        },
        {
          "name": "19454",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19454"
        },
        {
          "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-30/advisory"
        },
        {
          "name": "whereisit-unacev2-bo(26315)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
        },
        {
          "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
        },
        {
          "name": "25129",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25129"
        },
        {
          "name": "bitzipper-unacev2-bo(27763)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
        },
        {
          "name": "19834",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19834"
        },
        {
          "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
        },
        {
          "name": "tziptv-unacev2-bo(28787)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
        },
        {
          "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
        },
        {
          "name": "20009",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20009"
        },
        {
          "name": "izarc-unacev2-bo(26480)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
        },
        {
          "name": "ADV-2006-2047",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2047"
        },
        {
          "name": "extractnow-unacev2-ace-bo(26168)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
        },
        {
          "name": "14759",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14759"
        },
        {
          "name": "ADV-2006-1836",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1836"
        },
        {
          "name": "1016257",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016257"
        },
        {
          "name": "19612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19612"
        },
        {
          "name": "ADV-2006-1565",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1565"
        },
        {
          "name": "ADV-2006-1725",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1725"
        },
        {
          "name": "1015852",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015852"
        },
        {
          "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "automate-unacev2-bo(26982)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
            },
            {
              "name": "1016512",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016512"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-24/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-24/advisory"
            },
            {
              "name": "ADV-2006-2824",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2824"
            },
            {
              "name": "49",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/49"
            },
            {
              "name": "19884",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19884"
            },
            {
              "name": "eazel-ztvunacev2-bo(26479)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
            },
            {
              "name": "ADV-2006-1797",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1797"
            },
            {
              "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
            },
            {
              "name": "1014863",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014863"
            },
            {
              "name": "1016011",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016011"
            },
            {
              "name": "1016115",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016115"
            },
            {
              "name": "19939",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19939"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-46/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-46/advisory/"
            },
            {
              "name": "1016065",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016065"
            },
            {
              "name": "ADV-2006-1835",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1835"
            },
            {
              "name": "1016088",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016088"
            },
            {
              "name": "ADV-2006-3495",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3495"
            },
            {
              "name": "19967",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19967"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-27/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-27/"
            },
            {
              "name": "1016177",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016177"
            },
            {
              "name": "1016114",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016114"
            },
            {
              "name": "powerarchiver-unacev2-ace-bo(26272)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-50/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-50/advisory/"
            },
            {
              "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
            },
            {
              "name": "19931",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19931"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-36/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-36/advisory"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-28/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-28/advisory"
            },
            {
              "name": "filzip-unacev2-bo(26447)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
            },
            {
              "name": "19975",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19975"
            },
            {
              "name": "ADV-2006-1775",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1775"
            },
            {
              "name": "16479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16479"
            },
            {
              "name": "ultimatezip-unacev2-bo(26385)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
            },
            {
              "name": "servant-salamander-unacev2-bo(26116)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
            },
            {
              "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
            },
            {
              "name": "ADV-2006-1611",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1611"
            },
            {
              "name": "ADV-2006-1681",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1681"
            },
            {
              "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
            },
            {
              "name": "ADV-2006-2184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2184"
            },
            {
              "name": "ADV-2006-1577",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1577"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-33/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-33/advisory/"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-29/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-29/advisory/"
            },
            {
              "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
            },
            {
              "name": "19938",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19938"
            },
            {
              "name": "19581",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19581"
            },
            {
              "name": "antitrojan-unacev2-bo(26302)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
            },
            {
              "name": "ADV-2006-1694",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1694"
            },
            {
              "name": "20270",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20270"
            },
            {
              "name": "19890",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19890"
            },
            {
              "name": "19977",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19977"
            },
            {
              "name": "winhki-unacev2-bo(26142)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-38/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-38/advisory"
            },
            {
              "name": "19596",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19596"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-41/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-41/advisory/"
            },
            {
              "name": "1016066",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016066"
            },
            {
              "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
            },
            {
              "name": "19458",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19458"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-25/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-25/advisory"
            },
            {
              "name": "1016012",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016012"
            },
            {
              "name": "risingantivirus-unacev2-bo(26736)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-32/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-32/advisory/"
            },
            {
              "name": "19454",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19454"
            },
            {
              "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-30/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-30/advisory"
            },
            {
              "name": "whereisit-unacev2-bo(26315)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
            },
            {
              "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
            },
            {
              "name": "25129",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25129"
            },
            {
              "name": "bitzipper-unacev2-bo(27763)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
            },
            {
              "name": "19834",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19834"
            },
            {
              "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
            },
            {
              "name": "tziptv-unacev2-bo(28787)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
            },
            {
              "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
            },
            {
              "name": "20009",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20009"
            },
            {
              "name": "izarc-unacev2-bo(26480)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
            },
            {
              "name": "ADV-2006-2047",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2047"
            },
            {
              "name": "extractnow-unacev2-ace-bo(26168)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
            },
            {
              "name": "14759",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14759"
            },
            {
              "name": "ADV-2006-1836",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1836"
            },
            {
              "name": "1016257",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016257"
            },
            {
              "name": "19612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19612"
            },
            {
              "name": "ADV-2006-1565",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1565"
            },
            {
              "name": "ADV-2006-1725",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1725"
            },
            {
              "name": "1015852",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015852"
            },
            {
              "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2856",
    "datePublished": "2005-09-08T04:00:00",
    "dateReserved": "2005-09-08T00:00:00",
    "dateUpdated": "2024-08-07T22:53:28.858Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2694 (GCVE-0-2005-2694)
Vulnerability from cvelistv5
Published
2005-08-25 04:00
Modified
2024-08-07 22:45
Severity ?
CWE
  • n/a
Summary
Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:45:01.874Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "winace-temporary-file-bo(21941)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
          },
          {
            "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "winace-temporary-file-bo(21941)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
        },
        {
          "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2694",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "winace-temporary-file-bo(21941)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
            },
            {
              "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2694",
    "datePublished": "2005-08-25T04:00:00",
    "dateReserved": "2005-08-25T00:00:00",
    "dateUpdated": "2024-08-07T22:45:01.874Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0813 (GCVE-0-2006-0813)
Vulnerability from cvelistv5
Published
2006-02-24 11:00
Modified
2024-08-07 16:48
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
References
http://www.vupen.com/english/advisories/2006/0709 vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/17251 third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/23383 vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/425894/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://secunia.com/secunia_research/2005-67/advisory/ x_refsource_MISC
http://securitytracker.com/id?1015672 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/16786 vdb-entry, x_refsource_BID
http://securityreason.com/securityalert/479 third-party-advisory, x_refsource_SREASON
https://exchange.xforce.ibmcloud.com/vulnerabilities/24872 vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.179Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-0709",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0709"
          },
          {
            "name": "17251",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17251"
          },
          {
            "name": "23383",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23383"
          },
          {
            "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-67/advisory/"
          },
          {
            "name": "1015672",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015672"
          },
          {
            "name": "16786",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16786"
          },
          {
            "name": "479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/479"
          },
          {
            "name": "winace-arj-header-bo(24872)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-0709",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0709"
        },
        {
          "name": "17251",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17251"
        },
        {
          "name": "23383",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23383"
        },
        {
          "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-67/advisory/"
        },
        {
          "name": "1015672",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015672"
        },
        {
          "name": "16786",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16786"
        },
        {
          "name": "479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/479"
        },
        {
          "name": "winace-arj-header-bo(24872)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0813",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-0709",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0709"
            },
            {
              "name": "17251",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17251"
            },
            {
              "name": "23383",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23383"
            },
            {
              "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-67/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-67/advisory/"
            },
            {
              "name": "1015672",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015672"
            },
            {
              "name": "16786",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16786"
            },
            {
              "name": "479",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/479"
            },
            {
              "name": "winace-arj-header-bo(24872)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0813",
    "datePublished": "2006-02-24T11:00:00",
    "dateReserved": "2006-02-21T00:00:00",
    "dateUpdated": "2024-08-07T16:48:56.179Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2535 (GCVE-0-2007-2535)
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:42
Severity ?
CWE
  • n/a
Summary
WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080 vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/23823 vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/467646/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/41750 vdb-entry, x_refsource_OSVDB
http://securityreason.com/securityalert/2680 third-party-advisory, x_refsource_SREASON
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:42:33.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "multiple-vendor-zoo-dos(34080)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
          },
          {
            "name": "23823",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23823"
          },
          {
            "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
          },
          {
            "name": "41750",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/41750"
          },
          {
            "name": "2680",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2680"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "multiple-vendor-zoo-dos(34080)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
        },
        {
          "name": "23823",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23823"
        },
        {
          "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
        },
        {
          "name": "41750",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/41750"
        },
        {
          "name": "2680",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2680"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2535",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "multiple-vendor-zoo-dos(34080)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
            },
            {
              "name": "23823",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23823"
            },
            {
              "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
            },
            {
              "name": "41750",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/41750"
            },
            {
              "name": "2680",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2680"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2535",
    "datePublished": "2007-05-09T01:00:00",
    "dateReserved": "2007-05-08T00:00:00",
    "dateUpdated": "2024-08-07T13:42:33.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-6563 (GCVE-0-2007-6563)
Vulnerability from cvelistv5
Published
2007-12-28 00:00
Modified
2024-08-07 16:11
Severity ?
CWE
  • n/a
Summary
Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive.
References
http://www.vupen.com/english/advisories/2007/4312 vdb-entry, x_refsource_VUPEN
http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html third-party-advisory, x_refsource_JVNDB
http://www.securityfocus.com/bid/27017 vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/39268 vdb-entry, x_refsource_XF
http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225 x_refsource_MISC
http://jvn.jp/jp/JVN%2344736880/index.html third-party-advisory, x_refsource_JVN
http://osvdb.org/40267 vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/28215 third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:11:05.903Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-4312",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4312"
          },
          {
            "name": "JVNDB-2007-000822",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
          },
          {
            "name": "27017",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27017"
          },
          {
            "name": "winace-uue-bo(39268)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
          },
          {
            "name": "JVN#44736880",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
          },
          {
            "name": "40267",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/40267"
          },
          {
            "name": "28215",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28215"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-4312",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4312"
        },
        {
          "name": "JVNDB-2007-000822",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
        },
        {
          "name": "27017",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27017"
        },
        {
          "name": "winace-uue-bo(39268)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
        },
        {
          "name": "JVN#44736880",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
        },
        {
          "name": "40267",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/40267"
        },
        {
          "name": "28215",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28215"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6563",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-4312",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4312"
            },
            {
              "name": "JVNDB-2007-000822",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
            },
            {
              "name": "27017",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27017"
            },
            {
              "name": "winace-uue-bo(39268)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
            },
            {
              "name": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225",
              "refsource": "MISC",
              "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
            },
            {
              "name": "JVN#44736880",
              "refsource": "JVN",
              "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
            },
            {
              "name": "40267",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/40267"
            },
            {
              "name": "28215",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28215"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6563",
    "datePublished": "2007-12-28T00:00:00",
    "dateReserved": "2007-12-27T00:00:00",
    "dateUpdated": "2024-08-07T16:11:05.903Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}