Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2004-0234

Опубликовано: 18 авг. 2004
Источник: nvd
CVSS2: 10
EPSS Низкий

Описание

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*
cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*
cpe:2.3:a:redhat:lha:1.14i-9:*:i386:*:*:*:*:*
cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
cpe:2.3:a:stalker:cgpmcafee:3.2:*:*:*:*:*:*:*
cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*
cpe:2.3:a:tsugio_okamoto:lha:1.15:*:*:*:*:*:*:*
cpe:2.3:a:tsugio_okamoto:lha:1.17:*:*:*:*:*:*:*
cpe:2.3:a:winzip:winzip:9.0:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*

EPSS

Процентиль: 92%
0.08482
Низкий

10 Critical

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 21 год назад

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

redhat
около 21 года назад

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

debian
почти 21 год назад

Multiple stack-based buffer overflows in the get_header function in he ...

github
около 3 лет назад

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

fstec
около 21 года назад

Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 92%
0.08482
Низкий

10 Critical

CVSS2

Дефекты

CWE-119