Описание
Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.
Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4116
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28282
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28283
- http://secunia.com/advisories/21348
- http://securityreason.com/securityalert/1378
- http://vuln.sg/lhaz131-en.html
- http://www.chitora.jp/lhaz.html
- http://www.securityfocus.com/archive/1/442445/100/0/threaded
- http://www.securityfocus.com/bid/19377
- http://www.vupen.com/english/advisories/2006/3173
EPSS
CVE ID
Связанные уязвимости
Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.
EPSS