[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2004-0234

Date: (C)2004-08-18   (M)2017-10-12
 
CVSS Score: 10.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

Reference:
SECTRACK-1015866
BID-10243
SECUNIA-19514
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html
http://marc.info/?l=bugtraq&m=108422737918885&w=2
http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html
OSVDB-5753
OSVDB-5754
ADV-2006-1220
CLA-2004:840
DSA-515
FEDORA-2004-119
FLSA:1833
GLSA-200405-02
RHSA-2004:178
RHSA-2004:179
http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt
lha-multiple-bo(16012)

CPE    3
cpe:/a:sgi:propack:2.4
cpe:/a:sgi:propack:3.0
cpe:/a:winzip:winzip:9.0
CWE    1
CWE-119

© 2013 SecPod Technologies