Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/28283 | vdb entry |
http://vuln.sg/lhaz131-en.html | patch exploit |
http://www.securityfocus.com/archive/1/442445/100/0/threaded | mailing list |
http://www.chitora.jp/lhaz.html | |
http://www.securityfocus.com/bid/19377 | vdb entry |
http://www.vupen.com/english/advisories/2006/3173 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28282 | vdb entry |
http://securityreason.com/securityalert/1378 | third party advisory |
http://secunia.com/advisories/21348 | exploit third party advisory patch vendor advisory |