Vulnerabilites related to winace - winace
Vulnerability from fkie_nvd
Published
2005-08-26 15:50
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:winace:winace:2.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "65352B0F-D752-4814-92E9-CB0769E66EAB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name." } ], "id": "CVE-2005-2694", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-26T15:50:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:winace:winace:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9BC96B1C-CFD0-4752-896C-5EE0A43397DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:winace:winace:2.6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "65352B0F-D752-4814-92E9-CB0769E66EAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:winace:winace:2.60:*:*:*:*:*:*:*", "matchCriteriaId": "B8B82379-9F04-41E6-BCFE-34E7507C610F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." }, { "lang": "es", "value": "WinAce permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) mediante un archivo ZOO con una estructura de entrada de directorio (direntry structure) que apunta a un fichero anterior." } ], "id": "CVE-2007-2535", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-09T01:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/41750" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2680" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23823" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/41750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-02-24 11:02
Modified
2025-04-03 01:03
Severity ?
Summary
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:winace:winace:2.60:*:*:*:*:*:*:*", "matchCriteriaId": "B8B82379-9F04-41E6-BCFE-34E7507C610F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive." } ], "id": "CVE-2006-0813", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2006-02-24T11:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17251" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-67/advisory/" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/479" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015672" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/23383" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16786" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0709" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-67/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/23383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-09-08 10:03
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:winace:winace:2.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "64D2B1B2-B49D-4F22-B4C6-CE0FAF0FDF35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive." } ], "id": "CVE-2005-2856", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-09-08T10:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16479" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19454" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19458" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19581" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19596" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19612" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19834" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19890" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19931" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19938" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/19939" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19967" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19975" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19977" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20009" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20270" }, { "source": "cve@mitre.org", "url": "http://secunia.com/secunia_research/2005-41/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-24/advisory" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-25/advisory" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-27/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-28/advisory" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-29/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-30/advisory" }, { "source": "cve@mitre.org", "url": "http://secunia.com/secunia_research/2006-32/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-33/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-36/advisory" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-38/advisory" }, { "source": "cve@mitre.org", "url": "http://secunia.com/secunia_research/2006-46/advisory/" }, { "source": "cve@mitre.org", "url": "http://secunia.com/secunia_research/2006-50/advisory/" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/49" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014863" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015852" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016011" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016012" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016065" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016066" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016088" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016114" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016115" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016177" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016257" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016512" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25129" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/14759" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19884" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1565" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1577" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1611" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1681" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1694" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1725" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1775" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1797" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1835" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1836" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2047" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2184" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2824" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3495" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2005-41/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-24/advisory" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-25/advisory" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-27/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-28/advisory" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-29/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-30/advisory" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2006-32/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-33/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-36/advisory" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2006-38/advisory" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2006-46/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/secunia_research/2006-50/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/14759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*", "matchCriteriaId": "64AF6FAE-B025-4F70-9F52-C7C12C6F705D", "versionEndIncluding": "2.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AC3BF13-2946-411E-93A5-0C3AF0508C60", "versionEndIncluding": "4.7.980", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:4.6.394:*:*:*:*:*:*:*", "matchCriteriaId": "8683D747-C092-4841-AABF-280D7EB771F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.652:*:*:*:*:*:*:*", "matchCriteriaId": "D393356E-0464-41B6-9D56-2DCFC6900244", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.700:*:*:*:*:*:*:*", "matchCriteriaId": "0ED7C89E-E28B-4BE9-952D-86A8D089B41D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1519A450-8F71-408A-81B8-AA6F337E7A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "48872452-2B26-44C4-A9FF-0D9D23AAC95A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.652:*:*:*:*:*:*:*", "matchCriteriaId": "275D7948-61FB-4415-A9EB-59EEF9757149", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.655:*:*:*:*:*:*:*", "matchCriteriaId": "5CCC4081-D877-4DE3-9342-59BCE7C41CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.665:*:*:*:*:*:*:*", "matchCriteriaId": "B189DFCB-2307-43B4-8102-BA725CEE0711", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.691:*:*:*:*:*:*:*", "matchCriteriaId": "3C733E69-33B3-465B-B146-A68C26373E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:*:*:*:*:*:*", "matchCriteriaId": "2EF16A3D-BC29-4426-BDF5-F1C6E85228B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*", "matchCriteriaId": "33A71A2C-36AC-4F36-9D94-AA824F4DE14C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:*:*:*:*:*:*", "matchCriteriaId": "E02983BB-F027-4967-A230-933299D2D061", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*", "matchCriteriaId": "62618C12-3EAC-4434-B2A8-D83612F1A05C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:*:*:*:*:*:*", "matchCriteriaId": "238FB2B1-41CF-46DB-8ED7-7F2B6609C27D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*", "matchCriteriaId": "B949535B-9771-4AC6-BBDB-8BB3A789A1FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:*:*:*:*:*:*", "matchCriteriaId": "97FEA351-FFF6-4452-9A2B-A7AAF4D7EE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*", "matchCriteriaId": "DC6DA89A-BF71-4031-9B51-E5941FDE5E15", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:*:*:*:*:*:*", "matchCriteriaId": "18837F1C-8ECD-4202-9489-08D63FB28CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*", "matchCriteriaId": "DB201D49-EB74-4A5D-B641-86C4429E3EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "231DDF5E-5026-4844-8374-45F0926F8C4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "8822D55C-FEE7-41B5-A8D5-8D9F514CF815", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.603:*:*:*:*:*:*:*", "matchCriteriaId": "B89C0CA4-00DE-4CAD-B554-36C46815A919", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.652:*:*:*:*:*:*:*", "matchCriteriaId": "A618B922-80E7-4769-90BA-5FE231DA6B89", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.665:*:*:*:*:*:*:*", "matchCriteriaId": "40F19B83-BAD9-4CDC-95C5-6D352F223AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.691:*:*:*:*:*:*:*", "matchCriteriaId": "762B6C23-5ADD-4221-8146-DF9CE95637BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:*:*:*:*:*:*", "matchCriteriaId": "2F3B1651-DC3E-43B8-A5A4-8BEF7D668EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*", "matchCriteriaId": "DF2D8C10-01E4-43D7-93EE-342BA7E9C489", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:*:*:*:*:*:*", "matchCriteriaId": "3D0980CA-26A4-468E-82F3-E03953250343", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*", "matchCriteriaId": "AAB7888A-E884-4C73-AF10-698C56E080F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.869:*:*:*:*:*:*:*", "matchCriteriaId": "FF5B2325-D8EE-4D1E-8291-740726FC1EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:*:*:*:*:*:*", "matchCriteriaId": "FB0EF168-1F0D-4772-8922-0A75CAF28661", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*", "matchCriteriaId": "1F7F2957-4422-4891-B573-F68882D7C8E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:*:*:*:*:*:*", "matchCriteriaId": "5CAED694-2497-488B-A2AB-0781501678F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDD00670-7EC0-4AA4-98EF-C8AE38330284", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*", "matchCriteriaId": "C23C179C-B50E-4F47-BFFA-85848131C99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir:7.04.00.23:*:*:*:*:*:*:*", "matchCriteriaId": "5C813AD8-5D73-41DF-B710-3CEB20FB9EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*", "matchCriteriaId": "5DB520B5-36E8-4F4B-99FF-0FF3F708CC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*", "matchCriteriaId": "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD267D52-D580-4460-AFF9-E5BA478A98FA", "versionEndIncluding": "7.3.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:*:*:*:*:*:*", "matchCriteriaId": "64D94528-A54F-439B-8584-57A82CDF7318", "vulnerable": true }, { "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*", "matchCriteriaId": "DB66A5A4-6758-438D-9155-7475A5406DA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:panda:panda_antivirus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "A9F9AF4F-E974-4D6F-AF51-0DA7A59E64FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:panda:panda_antivirus_and_firewall:2007:*:*:*:*:*:*:*", "matchCriteriaId": "C4DBEED1-0648-45F3-AFC2-91C872A1B098", "vulnerable": true }, { "criteria": "cpe:2.3:a:picozip:picozip:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AD36471-D8DC-4B11-B53B-264AB1560063", "vulnerable": true }, { "criteria": "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*", "matchCriteriaId": "79845C9F-7884-4F77-B492-4A944D3DCCEA", "versionEndIncluding": "2.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:unzoo:unzoo:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B93C2E82-03E5-42CE-A589-B82FBCBE7D52", "vulnerable": true }, { "criteria": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF7B6EE8-25D5-4C89-A0B8-A069D330A9D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D03D666-D234-4626-82F9-EC5726BE1920", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_100:*:*:*:*:*:*:*", "matchCriteriaId": "D0BEEFB2-C6ED-43D5-B535-623931C38890", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_200:*:*:*:*:*:*:*", "matchCriteriaId": "C2ECF7F8-A29F-4868-9DE5-4227E5DA2285", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_300:*:*:*:*:*:*:*", "matchCriteriaId": "6A897043-9003-4F27-8C7D-AE6B2BD0389C", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_400:*:*:*:*:*:*:*", "matchCriteriaId": "1F05FEF8-6B34-4874-AD6B-A053415BD939", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_500:*:*:*:*:*:*:*", "matchCriteriaId": "D28FAD61-3723-4CCC-B890-C5869E7AC3EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_600:*:*:*:*:*:*:*", "matchCriteriaId": "7697AAC2-EC8A-496E-9336-29AAE61CD69E", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_800:*:*:*:*:*:*:*", "matchCriteriaId": "BAA47F3A-44BA-4011-8A44-1AE54D02E772", "vulnerable": true }, { "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_900:*:*:*:*:*:*:*", "matchCriteriaId": "423620AD-EA6A-4730-B97A-DF67247372BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." }, { "lang": "es", "value": "El archivo unzoo.c, tal como se utiliza en varios productos, incluyendo AMaViS versi\u00f3n 2.4.1 y anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito) por medio de un archivo ZOO con una estructura direntry que apunta hacia un archivo anterior." } ], "evaluatorSolution": "http://xforce.iss.net/xforce/xfdb/34080\r\n\r\n\r\nFor Barracuda Spam Firewall:\r\nUpgrade to the latest virus definition version of Barracuda Spam Firewall (virusdef 2.0.6399 for 3.4 and after or virusdef 2.0.6399o for prior to 3.4), available from the automatic update.\r\n\r\nFor Panda Software Antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4/2/2007 or later), available from the automatic update feature.\r\n\r\nFor avast! antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4.7.981 or later), available from the avast! antivirus Web site. See references.\r\n\r\nFor Avira AntiVir:\r\nUpgrade to the latest version of Avira AntiVir (avpack32.dll version 7.3.0.6 or later), available from the automatic update feature.\r\n\r\nFor AMaViS:\r\nRefer to ASA-2007-2 for patch, upgrade, or suggested workaround information. See References.", "id": "CVE-2007-1673", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-09T01:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36208" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25315" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2680" }, { "source": "cve@mitre.org", "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23823" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-28 00:46
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*", "matchCriteriaId": "C36B6D02-34DC-47CA-836C-18429D7F7C08", "versionEndIncluding": "2.65", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en WinAce 2.65 y versiones anteriores, y posiblemente otras versiones anteriores a 2.69, permite a atacantes remotos con la complicidad del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante un nombre de fichero largo en un archivo comprimido UUE." } ], "id": "CVE-2007-6563", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-12-28T00:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://jvn.jp/jp/JVN%2344736880/index.html" }, { "source": "cve@mitre.org", "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/40267" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28215" }, { "source": "cve@mitre.org", "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27017" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/4312" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/jp/JVN%2344736880/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/40267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/4312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2007-1673 (GCVE-0-2007-1673)
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:06:25.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "36208", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36208" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "25315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25315" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2680" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "36208", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36208" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "25315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25315" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2680" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1673", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.amavis.org/security/asa-2007-2.txt", "refsource": "CONFIRM", "url": "http://www.amavis.org/security/asa-2007-2.txt" }, { "name": "multiple-vendor-zoo-dos(34080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "36208", "refsource": "OSVDB", "url": "http://osvdb.org/36208" }, { "name": "23823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23823" }, { "name": "25315", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25315" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "2680", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2680" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1673", "datePublished": "2007-05-09T01:00:00", "dateReserved": "2007-03-24T00:00:00", "dateUpdated": "2024-08-07T13:06:25.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2856 (GCVE-0-2005-2856)
Vulnerability from cvelistv5
Published
2005-09-08 04:00
Modified
2024-08-07 22:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:53:28.858Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "automate-unacev2-bo(26982)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982" }, { "name": "1016512", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016512" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-24/advisory" }, { "name": "ADV-2006-2824", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2824" }, { "name": "49", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/49" }, { "name": "19884", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19884" }, { "name": "eazel-ztvunacev2-bo(26479)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479" }, { "name": "ADV-2006-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1797" }, { "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded" }, { "name": "1014863", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014863" }, { "name": "1016011", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016011" }, { "name": "1016115", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016115" }, { "name": "19939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19939" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-46/advisory/" }, { "name": "1016065", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016065" }, { "name": "ADV-2006-1835", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1835" }, { "name": "1016088", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016088" }, { "name": "ADV-2006-3495", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3495" }, { "name": "19967", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19967" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-27/" }, { "name": "1016177", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016177" }, { "name": "1016114", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016114" }, { "name": "powerarchiver-unacev2-ace-bo(26272)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-50/advisory/" }, { "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded" }, { "name": "19931", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19931" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-36/advisory" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-28/advisory" }, { "name": "filzip-unacev2-bo(26447)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447" }, { "name": "19975", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19975" }, { "name": "ADV-2006-1775", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1775" }, { "name": "16479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16479" }, { "name": "ultimatezip-unacev2-bo(26385)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385" }, { "name": "servant-salamander-unacev2-bo(26116)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116" }, { "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded" }, { "name": "ADV-2006-1611", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1611" }, { "name": "ADV-2006-1681", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1681" }, { "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded" }, { "name": "ADV-2006-2184", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2184" }, { "name": "ADV-2006-1577", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1577" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-33/advisory/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-29/advisory/" }, { "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded" }, { "name": "19938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19938" }, { "name": "19581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19581" }, { "name": "antitrojan-unacev2-bo(26302)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302" }, { "name": "ADV-2006-1694", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1694" }, { "name": "20270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20270" }, { "name": "19890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19890" }, { "name": "19977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19977" }, { "name": "winhki-unacev2-bo(26142)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-38/advisory" }, { "name": "19596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19596" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-41/advisory/" }, { "name": "1016066", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016066" }, { "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded" }, { "name": "19458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19458" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-25/advisory" }, { "name": "1016012", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016012" }, { "name": "risingantivirus-unacev2-bo(26736)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-32/advisory/" }, { "name": "19454", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19454" }, { "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2006-30/advisory" }, { "name": "whereisit-unacev2-bo(26315)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315" }, { "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded" }, { "name": "25129", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25129" }, { "name": "bitzipper-unacev2-bo(27763)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763" }, { "name": "19834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19834" }, { "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded" }, { "name": "tziptv-unacev2-bo(28787)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787" }, { "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded" }, { "name": "20009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20009" }, { "name": "izarc-unacev2-bo(26480)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480" }, { "name": "ADV-2006-2047", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2047" }, { "name": "extractnow-unacev2-ace-bo(26168)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168" }, { "name": "14759", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14759" }, { "name": "ADV-2006-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1836" }, { "name": "1016257", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016257" }, { "name": "19612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19612" }, { "name": "ADV-2006-1565", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1565" }, { "name": "ADV-2006-1725", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1725" }, { "name": "1015852", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015852" }, { "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "automate-unacev2-bo(26982)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982" }, { "name": "1016512", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016512" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-24/advisory" }, { "name": "ADV-2006-2824", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2824" }, { "name": "49", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/49" }, { "name": "19884", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19884" }, { "name": "eazel-ztvunacev2-bo(26479)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479" }, { "name": "ADV-2006-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1797" }, { "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded" }, { "name": "1014863", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014863" }, { "name": "1016011", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016011" }, { "name": "1016115", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016115" }, { "name": "19939", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19939" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-46/advisory/" }, { "name": "1016065", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016065" }, { "name": "ADV-2006-1835", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1835" }, { "name": "1016088", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016088" }, { "name": "ADV-2006-3495", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3495" }, { "name": "19967", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19967" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-27/" }, { "name": "1016177", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016177" }, { "name": "1016114", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016114" }, { "name": "powerarchiver-unacev2-ace-bo(26272)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-50/advisory/" }, { "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded" }, { "name": "19931", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19931" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-36/advisory" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-28/advisory" }, { "name": "filzip-unacev2-bo(26447)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447" }, { "name": "19975", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19975" }, { "name": "ADV-2006-1775", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1775" }, { "name": "16479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16479" }, { "name": "ultimatezip-unacev2-bo(26385)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385" }, { "name": "servant-salamander-unacev2-bo(26116)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116" }, { "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded" }, { "name": "ADV-2006-1611", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1611" }, { "name": "ADV-2006-1681", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1681" }, { "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded" }, { "name": "ADV-2006-2184", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2184" }, { "name": "ADV-2006-1577", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1577" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-33/advisory/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-29/advisory/" }, { "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded" }, { "name": "19938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19938" }, { "name": "19581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19581" }, { "name": "antitrojan-unacev2-bo(26302)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302" }, { "name": "ADV-2006-1694", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1694" }, { "name": "20270", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20270" }, { "name": "19890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19890" }, { "name": "19977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19977" }, { "name": "winhki-unacev2-bo(26142)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-38/advisory" }, { "name": "19596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19596" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-41/advisory/" }, { "name": "1016066", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016066" }, { "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded" }, { "name": "19458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19458" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-25/advisory" }, { "name": "1016012", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016012" }, { "name": "risingantivirus-unacev2-bo(26736)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-32/advisory/" }, { "name": "19454", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19454" }, { "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2006-30/advisory" }, { "name": "whereisit-unacev2-bo(26315)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315" }, { "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded" }, { "name": "25129", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25129" }, { "name": "bitzipper-unacev2-bo(27763)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763" }, { "name": "19834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19834" }, { "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded" }, { "name": "tziptv-unacev2-bo(28787)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787" }, { "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded" }, { "name": "20009", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20009" }, { "name": "izarc-unacev2-bo(26480)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480" }, { "name": "ADV-2006-2047", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2047" }, { "name": "extractnow-unacev2-ace-bo(26168)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168" }, { "name": "14759", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14759" }, { "name": "ADV-2006-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1836" }, { "name": "1016257", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016257" }, { "name": "19612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19612" }, { "name": "ADV-2006-1565", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1565" }, { "name": "ADV-2006-1725", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1725" }, { "name": "1015852", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015852" }, { "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2856", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "automate-unacev2-bo(26982)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982" }, { "name": "1016512", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016512" }, { "name": "http://secunia.com/secunia_research/2006-24/advisory", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-24/advisory" }, { "name": "ADV-2006-2824", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2824" }, { "name": "49", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/49" }, { "name": "19884", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19884" }, { "name": "eazel-ztvunacev2-bo(26479)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479" }, { "name": "ADV-2006-1797", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1797" }, { "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded" }, { "name": "1014863", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014863" }, { "name": "1016011", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016011" }, { "name": "1016115", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016115" }, { "name": "19939", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19939" }, { "name": "http://secunia.com/secunia_research/2006-46/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-46/advisory/" }, { "name": "1016065", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016065" }, { "name": "ADV-2006-1835", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1835" }, { "name": "1016088", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016088" }, { "name": "ADV-2006-3495", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3495" }, { "name": "19967", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19967" }, { "name": "http://secunia.com/secunia_research/2006-27/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-27/" }, { "name": "1016177", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016177" }, { "name": "1016114", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016114" }, { "name": "powerarchiver-unacev2-ace-bo(26272)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272" }, { "name": "http://secunia.com/secunia_research/2006-50/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-50/advisory/" }, { "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded" }, { "name": "19931", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19931" }, { "name": "http://secunia.com/secunia_research/2006-36/advisory", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-36/advisory" }, { "name": "http://secunia.com/secunia_research/2006-28/advisory", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-28/advisory" }, { "name": "filzip-unacev2-bo(26447)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447" }, { "name": "19975", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19975" }, { "name": "ADV-2006-1775", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1775" }, { "name": "16479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16479" }, { "name": "ultimatezip-unacev2-bo(26385)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385" }, { "name": "servant-salamander-unacev2-bo(26116)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116" }, { "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded" }, { "name": "ADV-2006-1611", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1611" }, { "name": "ADV-2006-1681", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1681" }, { "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded" }, { "name": "ADV-2006-2184", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2184" }, { "name": "ADV-2006-1577", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1577" }, { "name": "http://secunia.com/secunia_research/2006-33/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-33/advisory/" }, { "name": "http://secunia.com/secunia_research/2006-29/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-29/advisory/" }, { "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded" }, { "name": "19938", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19938" }, { "name": "19581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19581" }, { "name": "antitrojan-unacev2-bo(26302)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302" }, { "name": "ADV-2006-1694", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1694" }, { "name": "20270", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20270" }, { "name": "19890", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19890" }, { "name": "19977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19977" }, { "name": "winhki-unacev2-bo(26142)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142" }, { "name": "http://secunia.com/secunia_research/2006-38/advisory", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-38/advisory" }, { "name": "19596", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19596" }, { "name": "http://secunia.com/secunia_research/2005-41/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-41/advisory/" }, { "name": "1016066", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016066" }, { "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded" }, { "name": "19458", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19458" }, { "name": "http://secunia.com/secunia_research/2006-25/advisory", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-25/advisory" }, { "name": "1016012", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016012" }, { "name": "risingantivirus-unacev2-bo(26736)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736" }, { "name": "http://secunia.com/secunia_research/2006-32/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-32/advisory/" }, { "name": "19454", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19454" }, { "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2006-30/advisory", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2006-30/advisory" }, { "name": "whereisit-unacev2-bo(26315)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315" }, { "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded" }, { "name": "25129", "refsource": "OSVDB", "url": "http://www.osvdb.org/25129" }, { "name": "bitzipper-unacev2-bo(27763)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763" }, { "name": "19834", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19834" }, { "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded" }, { "name": "tziptv-unacev2-bo(28787)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787" }, { "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded" }, { "name": "20009", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20009" }, { "name": "izarc-unacev2-bo(26480)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480" }, { "name": "ADV-2006-2047", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2047" }, { "name": "extractnow-unacev2-ace-bo(26168)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168" }, { "name": "14759", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14759" }, { "name": "ADV-2006-1836", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1836" }, { "name": "1016257", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016257" }, { "name": "19612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19612" }, { "name": "ADV-2006-1565", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1565" }, { "name": "ADV-2006-1725", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1725" }, { "name": "1015852", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015852" }, { "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2856", "datePublished": "2005-09-08T04:00:00", "dateReserved": "2005-09-08T00:00:00", "dateUpdated": "2024-08-07T22:53:28.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2694 (GCVE-0-2005-2694)
Vulnerability from cvelistv5
Published
2005-08-25 04:00
Modified
2024-08-07 22:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "winace-temporary-file-bo(21941)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941" }, { "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "winace-temporary-file-bo(21941)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941" }, { "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2694", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "winace-temporary-file-bo(21941)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941" }, { "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2694", "datePublished": "2005-08-25T04:00:00", "dateReserved": "2005-08-25T00:00:00", "dateUpdated": "2024-08-07T22:45:01.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0813 (GCVE-0-2006-0813)
Vulnerability from cvelistv5
Published
2006-02-24 11:00
Modified
2024-08-07 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:48:56.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-0709", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0709" }, { "name": "17251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17251" }, { "name": "23383", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23383" }, { "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-67/advisory/" }, { "name": "1015672", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015672" }, { "name": "16786", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16786" }, { "name": "479", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/479" }, { "name": "winace-arj-header-bo(24872)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-0709", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0709" }, { "name": "17251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17251" }, { "name": "23383", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23383" }, { "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-67/advisory/" }, { "name": "1015672", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015672" }, { "name": "16786", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16786" }, { "name": "479", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/479" }, { "name": "winace-arj-header-bo(24872)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0813", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-0709", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0709" }, { "name": "17251", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17251" }, { "name": "23383", "refsource": "OSVDB", "url": "http://www.osvdb.org/23383" }, { "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2005-67/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-67/advisory/" }, { "name": "1015672", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015672" }, { "name": "16786", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16786" }, { "name": "479", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/479" }, { "name": "winace-arj-header-bo(24872)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0813", "datePublished": "2006-02-24T11:00:00", "dateReserved": "2006-02-21T00:00:00", "dateUpdated": "2024-08-07T16:48:56.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2535 (GCVE-0-2007-2535)
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:42:33.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "41750", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41750" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2680" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "multiple-vendor-zoo-dos(34080)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "23823", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23823" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "41750", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41750" }, { "name": "2680", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2680" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "multiple-vendor-zoo-dos(34080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080" }, { "name": "23823", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23823" }, { "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded" }, { "name": "41750", "refsource": "OSVDB", "url": "http://osvdb.org/41750" }, { "name": "2680", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2680" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2535", "datePublished": "2007-05-09T01:00:00", "dateReserved": "2007-05-08T00:00:00", "dateUpdated": "2024-08-07T13:42:33.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-6563 (GCVE-0-2007-6563)
Vulnerability from cvelistv5
Published
2007-12-28 00:00
Modified
2024-08-07 16:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:11:05.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-4312", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4312" }, { "name": "JVNDB-2007-000822", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html" }, { "name": "27017", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27017" }, { "name": "winace-uue-bo(39268)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225" }, { "name": "JVN#44736880", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/jp/JVN%2344736880/index.html" }, { "name": "40267", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/40267" }, { "name": "28215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28215" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-4312", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4312" }, { "name": "JVNDB-2007-000822", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html" }, { "name": "27017", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27017" }, { "name": "winace-uue-bo(39268)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225" }, { "name": "JVN#44736880", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/jp/JVN%2344736880/index.html" }, { "name": "40267", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/40267" }, { "name": "28215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28215" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6563", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-4312", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4312" }, { "name": "JVNDB-2007-000822", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html" }, { "name": "27017", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27017" }, { "name": "winace-uue-bo(39268)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268" }, { "name": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225", "refsource": "MISC", "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225" }, { "name": "JVN#44736880", "refsource": "JVN", "url": "http://jvn.jp/jp/JVN%2344736880/index.html" }, { "name": "40267", "refsource": "OSVDB", "url": "http://osvdb.org/40267" }, { "name": "28215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28215" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6563", "datePublished": "2007-12-28T00:00:00", "dateReserved": "2007-12-27T00:00:00", "dateUpdated": "2024-08-07T16:11:05.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }