ID OSVDB:28585
Type osvdb
Reporter OSVDB
Modified 2006-09-07T05:03:55
Description
No description provided by the source
References:
Vendor URL: http://www.ziptv.com/
Secunia Advisory ID:20270
Secunia Advisory ID:21458
Other Advisory URL: http://secunia.com/secunia_research/2006-72/advisory/
Other Advisory URL: http://secunia.com/secunia_research/2006-50/advisory/
CVE-2006-2482
{"type": "osvdb", "published": "2006-09-07T05:03:55", "href": "https://vulners.com/osvdb/OSVDB:28585", "bulletinFamily": "software", "cvss": {"vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 6.8}, "viewCount": 1, "edition": 1, "reporter": "OSVDB", "title": "ZipTV ARJ Handling Header Block Processing Overflow", "affectedSoftware": [], "enchantments": {"score": {"value": 6.0, "vector": "NONE", "modified": "2017-04-28T13:20:24", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-2482"]}], "modified": "2017-04-28T13:20:24", "rev": 2}, "vulnersScore": 6.0}, "references": [], "id": "OSVDB:28585", "lastseen": "2017-04-28T13:20:24", "cvelist": ["CVE-2006-2482"], "modified": "2006-09-07T05:03:55", "description": "# No description provided by the source\n\n## References:\nVendor URL: http://www.ziptv.com/\n[Secunia Advisory ID:20270](https://secuniaresearch.flexerasoftware.com/advisories/20270/)\n[Secunia Advisory ID:21458](https://secuniaresearch.flexerasoftware.com/advisories/21458/)\nOther Advisory URL: http://secunia.com/secunia_research/2006-72/advisory/\nOther Advisory URL: http://secunia.com/secunia_research/2006-50/advisory/\n[CVE-2006-2482](https://vulners.com/cve/CVE-2006-2482)\n"}
{"cve": [{"lastseen": "2021-02-02T05:27:20", "description": "Heap-based buffer overflow in the TZipTV component in (1) ZipTV for Delphi 7 2006.1.26 and for C++ Builder 2006-1.16, (2) PentaZip 8.5.1.190 and PentaSuite-PRO 8.5.1.221, and possibly other products, allows user-assisted attackers to execute arbitrary code via an ARJ archive with a long header. NOTE: the ACE archive vector is covered by CVE-2005-2856.", "edition": 4, "cvss3": {}, "published": "2006-09-08T21:04:00", "title": "CVE-2006-2482", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": true}, "cvelist": ["CVE-2006-2482"], "modified": "2017-07-20T01:31:00", "cpe": ["cpe:/a:pentaware:pentasuite-pro:8.5.1.221", "cpe:/a:pentaware:pentazip:8.5.1.190", "cpe:/a:microchip_data_systems:ziptv_for_delphi_7:2006.1.26", "cpe:/a:microchip_data_systems:ziptv_for_c\\+\\+_builder:2006.1.16"], "id": "CVE-2006-2482", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2482", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microchip_data_systems:ziptv_for_delphi_7:2006.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:pentaware:pentasuite-pro:8.5.1.221:*:*:*:*:*:*:*", "cpe:2.3:a:microchip_data_systems:ziptv_for_c\\+\\+_builder:2006.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:pentaware:pentazip:8.5.1.190:*:*:*:*:*:*:*"]}]}