Advertisement






TUGZip ARJ Archive Handling Buffer OverflowVulnerability

CVE Category Price Severity
CVE-2008-1479 CWE-119 Not specified High
Author Risk Exploitation Type Date
skote High Local 2006-01-07
CPE
cpe:cpe:/a:tugzip:arj_archive_handling:buffer_overflow
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2005120084

Below is a copy:

======================================================================

Secunia Research 30/12/2005

- TUGZip ARJ Archive Handling Buffer Overflow Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software

* TUGZip 3.4.0.0

Other versions may also be affected.

====================================================================== 
2) Severity

Rating: Moderately Critical
Impact: System access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in TUGZip, which can
be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error when handling an
ARJ archive containing a file with an overly long filename. This can
be exploited to cause a stack-based buffer overflow.

Successful exploitation allows arbitrary code execution when a
malicious ARJ file is opened.

The vulnerability has been confirmed in version 3.4.0.0. Other
versions may also be affected.

====================================================================== 
4) Solution

Do not open untrusted ARJ archives.

====================================================================== 
5) Time Table

07/10/2005 - Initial vendor notification.
13/10/2005 - Initial vendor reply.
15/11/2005 - Reminder sent.
30/12/2005 - Public disclosure.

====================================================================== 
6) Credits

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

No other references.

====================================================================== 
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2005-63/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum