Lucene search

K
cve[email protected]CVE-2014-2720
HistoryMay 27, 2014 - 11:15 a.m.

CVE-2014-2720

2014-05-2711:15:39
CWE-94
web.nvd.nist.gov
21
cve-2014-2720
izarc
file name display
file execution
vulnerability
zip archive
remote attack
code execution
file extension spoofing
nvd

7.2 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.9%

IZArc 4.1.8 displays a file’s name on the basis of a ZIP archive’s Central Directory entry, but launches this file on the basis of a ZIP archive’s local file header, which allows user-assisted remote attackers to conduct file-extension spoofing attacks via a modified Central Directory, as demonstrated by unintended code execution prompted by a .jpg extension in the Central Directory and a .exe extension in the local file header.

Affected configurations

NVD
Node
izarcizarcMatch4.1.8
CPENameOperatorVersion
izarc:izarcizarceq4.1.8

7.2 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.9%

Related for CVE-2014-2720