Описание
Stack-based buffer overflow in the zfile_gunzip function in zfile.c in WinUAE 1.4.4 and earlier allows user-assisted remote attackers to execute arbitrary code via a long filename in a gzipped archive, such as a (1) gz, (2) adz, (3) roz, or (4) hdz archive in a compressed floppy disk image.
Stack-based buffer overflow in the zfile_gunzip function in zfile.c in WinUAE 1.4.4 and earlier allows user-assisted remote attackers to execute arbitrary code via a long filename in a gzipped archive, such as a (1) gz, (2) adz, (3) roz, or (4) hdz archive in a compressed floppy disk image.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-6537
- http://aluigi.altervista.org/adv/winuaebof-adv.txt
- http://aluigi.org/poc/winuaebof.zip
- http://osvdb.org/39902
- http://secunia.com/advisories/28208
- http://securityreason.com/securityalert/3487
- http://www.securityfocus.com/archive/1/485446/100/0/threaded
- http://www.securityfocus.com/bid/26979
- http://www.vupen.com/english/advisories/2007/4306/references
- http://www.winuae.net/frames/mainframe.html
Связанные уязвимости
Stack-based buffer overflow in the zfile_gunzip function in zfile.c in WinUAE 1.4.4 and earlier allows user-assisted remote attackers to execute arbitrary code via a long filename in a gzipped archive, such as a (1) gz, (2) adz, (3) roz, or (4) hdz archive in a compressed floppy disk image.