Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2004-0234

Опубликовано: 18 авг. 2004
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 10

Описание

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

РелизСтатусПримечание
dapper

released

1.14i-10
devel

released

1.14i-10
edgy

released

1.14i-10
feisty

released

1.14i-10
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 92%
0.08482
Низкий

10 Critical

CVSS2

Связанные уязвимости

redhat
около 21 года назад

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

nvd
почти 21 год назад

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

debian
почти 21 год назад

Multiple stack-based buffer overflows in the get_header function in he ...

github
около 3 лет назад

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

fstec
около 21 года назад

Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 92%
0.08482
Низкий

10 Critical

CVSS2