Vulnerability CVE-2004-0234


Published: 2004-08-18   Modified: 2012-02-12

Description:
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Winzip -> Winzip 
Tsugio okamoto -> LHA 
Stalker -> Cgpmcafee 
SGI -> Propack 
Redhat -> LHA 
Redhat -> Fedora core 
Rarlab -> Winrar 
F-secure -> F-secure anti-virus 
F-secure -> F-secure for firewalls 
F-secure -> F-secure internet security 
F-secure -> F-secure personal express 
F-secure -> Internet gatekeeper 
Clearswift -> Mailsweeper 

 References:
http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000840
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html
http://marc.info/?l=bugtraq&m=108422737918885&w=2
http://security.gentoo.org/glsa/glsa-200405-02.xml
http://securitytracker.com/id?1015866
http://www.debian.org/security/2004/dsa-515
http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt
http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html
http://www.redhat.com/support/errata/RHSA-2004-178.html
http://www.redhat.com/support/errata/RHSA-2004-179.html
http://www.securityfocus.com/bid/10243
http://www.vupen.com/english/advisories/2006/1220
https://bugzilla.fedora.us/show_bug.cgi?id=1833
https://exchange.xforce.ibmcloud.com/vulnerabilities/16012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881

Copyright 2024, cxsecurity.com

 

Back to Top