[Japanese]
|
JVNDB-2010-000026
|
Explzh buffer overflow vulnerability
|
Explzh contains a buffer overflow vulnerability.
Explzh, a file compression/decompression software supporting multiple compression file formats, contains a buffer overflow vulnerability when processing a LHA file header.
Note that versions of Explzh that contain "Arcext.dll" version 2.16.1 and earlier are vulnerable.
Kenju Takano reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V2 Severity: Base Metrics 6.8 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Medium
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: Partial
|
|
pon software
- Explzh Ver.5.62 and earlier
|
|
When processing a specially crafted LHA file, a remote attacker may be able to execute arbitrary code.
|
[Update the Software]
Update to the latest version according to the information provided by the developer.
|
pon software
|
- Buffer Errors(CWE-119) [IPA Evaluation]
|
- CVE-2010-2434
|
- JVN : JVN#34729123
- National Vulnerability Database (NVD) : CVE-2010-2434
- Secunia Advisory : SA40324
- SecurityFocus : 41025
- ISS X-Force Database : 59624
- OPEN SOURCE VULNERABILITY DATABASE (OSVDB) : 65666
|
- [2010/6/22]
Web page published
|