CVE-2006-2161
CVSS5.1
发布时间 :2006-05-09 06:02:00
修订时间 :2016-10-17 23:39:41
NMCOPS    

[原文]Buffer overflow in (1) TZipBuilder 1.79.03.01, (2) Abakt 0.9.2 and 0.9.3-beta1, (3) CAM UnZip 4.0 and 4.3, and possibly other products, allows user-assisted attackers to execute arbitrary code via a ZIP archive that contains a file with a long file name.


[CNNVD]TZipBuilder ZIP文件名处理 多个缓冲区溢出漏洞(CNNVD-200605-154)

        TZipBuilder是Delphi组件TZipMaster的CPP翻译,用于解压ZIP文档。
        TZipBuilder在列出包含有超长文件名文件的ZIP文档内容时存在栈溢出漏洞,远程攻击者可以诱骗用户访问特制的ZIP文档导致执行任意指令。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:cam_development:cam_unzip:4.0
cpe:/a:erik_dienske:abakt:0.9.2
cpe:/a:roger_aelbrecht:tzipbuilder:1.79.03.01
cpe:/a:cam_development:cam_unzip:4.3
cpe:/a:erik_dienske:abakt:0.9.3_beta1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2161
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2161
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-154
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=full-disclosure&m=114771024009857&w=2
(UNKNOWN)  FULLDISC  20060515 Secunia Research: Abakt ZIP File Handling Buffer
http://securityreason.com/securityalert/853
(UNKNOWN)  SREASON  853
http://securitytracker.com/id?1016064
(PATCH)  SECTRACK  1016064
http://securitytracker.com/id?1016107
(PATCH)  SECTRACK  1016107
http://www.securityfocus.com/archive/1/archive/1/433257/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060508 Secunia Research: TZipBuilder ZIP File Handling Buffer OverflowVulnerability
http://www.securityfocus.com/archive/1/archive/1/434019/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060515 Secunia Research: Abakt ZIP File Handling Buffer OverflowVulnerability
http://www.securityfocus.com/archive/1/archive/1/434520/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060519 Secunia Research: CAM UnZip ZIP File Handling Buffer OverflowVulnerability
http://www.securityfocus.com/bid/17880
(PATCH)  BID  17880
http://www.vupen.com/english/advisories/2006/1687
(UNKNOWN)  VUPEN  ADV-2006-1687
http://www.vupen.com/english/advisories/2006/1805
(UNKNOWN)  VUPEN  ADV-2006-1805
http://www.vupen.com/english/advisories/2006/1865
(UNKNOWN)  VUPEN  ADV-2006-1865
http://www.xs4all.nl/~edienske/abakt/releases.html#0.9.3-RC1
(UNKNOWN)  CONFIRM  http://www.xs4all.nl/~edienske/abakt/releases.html#0.9.3-RC1
http://xforce.iss.net/xforce/xfdb/26275
(UNKNOWN)  XF  tzipbuilder-zip-bo(26275)
http://xforce.iss.net/xforce/xfdb/26435
(PATCH)  XF  abakt-zip-bo(26435)
http://xforce.iss.net/xforce/xfdb/26549
(PATCH)  XF  camunzip-archive-bo(26549)

- 漏洞信息

TZipBuilder ZIP文件名处理 多个缓冲区溢出漏洞
中危 缓冲区溢出
2006-05-09 00:00:00 2006-08-28 00:00:00
远程  
        TZipBuilder是Delphi组件TZipMaster的CPP翻译,用于解压ZIP文档。
        TZipBuilder在列出包含有超长文件名文件的ZIP文档内容时存在栈溢出漏洞,远程攻击者可以诱骗用户访问特制的ZIP文档导致执行任意指令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.drehoeksw.net/downloads/ZipBuilder1790400.zip

- 漏洞信息 (F46497)

secunia-CAM.txt (PacketStormID:F46497)
2006-05-22 00:00:00
Tan Chew Keong  secunia.com
advisory,overflow
CVE-2006-2161
[点击下载]

Secunia Research has discovered a vulnerability in CAM UnZip versions 4.0 and 4.3, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when listing the contents of a ZIP archive. This can be exploited to cause a stack-based buffer overflow when a malicious ZIP archive containing a file with an overly long filename is opened.

====================================================================== 

                    Secunia Research 19/05/2006

    - CAM UnZip ZIP File Handling Buffer Overflow Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software 

* CAM UnZip version 4.0 and 4.3

Prior versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderately Critical
Impact: System Access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in CAM UnZip, which
can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error when listing the
contents of a ZIP archive. This can be exploited to cause a
stack-based buffer overflow when a malicious ZIP archive containing
a file with an overly long filename is opened.

The vulnerability is related to:
SA19945

====================================================================== 
4) Solution 

Update to version 4.4.
http://www.camunzip.com/download.htm

====================================================================== 
5) Time Table 

03/05/2006 - Initial vendor notification.
03/05/2006 - Initial vendor reply.
19/05/2006 - Public disclosure.

====================================================================== 
6) Credits 

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

SA19945:
http://secunia.com/advisories/19945/

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2006-2161 for the vulnerability.

====================================================================== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-34/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================



    

- 漏洞信息 (F46456)

secunia-Abakt.txt (PacketStormID:F46456)
2006-05-22 00:00:00
Tan Chew Keong  secunia.com
advisory,overflow
CVE-2006-2161
[点击下载]

Secunia Research has discovered a vulnerability in Abakt, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when listing the contents of a ZIP archive. This can be exploited to cause a stack-based buffer overflow when a malicious ZIP archive containing a file with an overly long filename is opened. Versions 0.9.2 and 0.9.3-beta1 are affected.

====================================================================== 

                    Secunia Research 15/05/2006

      - Abakt ZIP File Handling Buffer Overflow Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software 

* Abakt version 0.9.2 and 0.9.3-beta1

Prior versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderately Critical
Impact: System Access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Abakt, which can
be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error when listing the
contents of a ZIP archive. This can be exploited to cause a
stack-based buffer overflow when a malicious ZIP archive containing
a file with an overly long filename is opened.

The vulnerability is related to:
SA19945

Successful exploitation allows execution of arbitrary code but
requires that the user is e.g. tricked into opening a malicious ZIP
archive from within the "Restore Zip Archive" functionality.

====================================================================== 
4) Solution 

The vulnerability has been fixed in 0.9.3-RC1.

====================================================================== 
5) Time Table 

12/05/2006 - Initial vendor notification.
15/05/2006 - Initial vendor reply.
15/05/2006 - Public disclosure.

====================================================================== 
6) Credits 

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

SA19945:
http://secunia.com/advisories/19945/

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2006-2161 for the vulnerability.

====================================================================== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-31/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================



    

- 漏洞信息 (F46226)

secunia-TZip.txt (PacketStormID:F46226)
2006-05-09 00:00:00
Tan Chew Keong  secunia.com
advisory,overflow,arbitrary
CVE-2006-2161
[点击下载]

Secunia Research has discovered a vulnerability in TZipBuilder version 1.79.03.01, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when listing the contents of a ZIP archive that contains a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a specially crafted ZIP archive is opened. Successful exploitation allows execution of arbitrary code with the privileges of an application that uses the library.

====================================================================== 

                    Secunia Research 08/05/2006

   - TZipBuilder ZIP File Handling Buffer Overflow Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software 

* TZipBuilder 1.79.03.01. 

Prior versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderately Critical
Impact: System Access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in TZipBuilder, which
can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error when listing the
contents of a ZIP archive that contains a file with an overly long
filename. This can be exploited to cause a stack-based buffer overflow
when a specially crafted ZIP archive is opened.

Successful exploitation allows execution of arbitrary code with the
privileges of an application that uses the library.

====================================================================== 
4) Solution 

Update to version 1.79.04.00.
http://www.drehoeksw.net/ZipBuild2.html

====================================================================== 
5) Time Table 

03/05/2006 - Initial vendor notification.
03/05/2006 - Initial vendor reply.
08/05/2006 - Public disclosure.

====================================================================== 
6) Credits 

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2006-2161 for the vulnerability.

====================================================================== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-26/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================




    

- 漏洞信息

25348
TZipBuilder ZIP File Archive Filename Overflow
Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-05-08 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.79.04.00 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

TZipBuilder ZIP File Buffer Overflow Vulnerability
Boundary Condition Error 17880
Yes No
2006-05-08 12:00:00 2006-05-19 05:48:00
Tan Chew Keong of Secunia Research disclosed this vulnerability.

- 受影响的程序版本

Roger Aelbrecht TZipBuilder 1.79.3 .01
Erik Dienske Abakt 0.9.3 -beta1
Erik Dienske Abakt 0.9.2
CAM Development CAM UnZip 4.3
CAM Development CAM UnZip 4.0
Roger Aelbrecht TZipBuilder 1.79.4 .00
Erik Dienske Abakt 0.9.3 -RC1
CAM Development CAM UnZip 4.4

- 不受影响的程序版本

Roger Aelbrecht TZipBuilder 1.79.4 .00
Erik Dienske Abakt 0.9.3 -RC1
CAM Development CAM UnZip 4.4

- 漏洞讨论

TZipBuilder is susceptible to a buffer-overflow vulnerability. The application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.

This issue allows attackers to execute arbitrary machine code in the context of users running the affected application.

Version 1.79.03.01 of TZipBuilder is vulnerable to this issue; prior versions may also be affected.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

This issue has been addressed in version 1.79.04.00.


CAM Development CAM UnZip 4.3

CAM Development CAM UnZip 4.0

Erik Dienske Abakt 0.9.2

Erik Dienske Abakt 0.9.3 -beta1

Roger Aelbrecht TZipBuilder 1.79.3 .01

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站