unalz Archive Extraction Filename Overflow

2005-11-26T08:18:34
ID OSVDB:21160
Type osvdb
Reporter OSVDB
Modified 2005-11-26T08:18:34

Description

Vulnerability Description

A remote overflow exists in unalz. The application fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted 'ALZ' archive containing a file with an overly long filename, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Solution Description

Upgrade to version 0.53 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

A remote overflow exists in unalz. The application fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted 'ALZ' archive containing a file with an overly long filename, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

References:

Vendor URL: http://www.kipple.pe.kr/win/unalz/ Vendor Specific News/Changelog Entry: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=340842 Secunia Advisory ID:18665 Secunia Advisory ID:17774 Other Advisory URL: http://www.debian.org/security/2006/dsa-959 ISS X-Force ID: 23267 FrSIRT Advisory: ADV-2005-2604 CVE-2005-3862 Bugtraq ID: 15577