[SA20179] ZipCentral ZIP File Handling Buffer Overflow Vulnerability

Type securityvulns
Reporter Securityvulns
Modified 2006-05-30T00:00:00


Want to join the Secunia Security Team?

Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.


TITLE: ZipCentral ZIP File Handling Buffer Overflow Vulnerability


VERIFY ADVISORY: http://secunia.com/advisories/20179/

CRITICAL: Moderately critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: ZipCentral 4.x http://secunia.com/product/9233/

DESCRIPTION: Secunia Research has discovered a vulnerability in ZipCentral, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the handling of filenames in a ZIP archive. This can be exploited to cause a stack-based buffer overflow when a malicious ZIP archive containing a file with an overly long filename is extracted.

Successful exploitation allows arbitrary code execution.

The vulnerability has been confirmed in version 4.01. Other versions may also be affected.

SOLUTION: Do not extract ZIP files from untrusted sources.

PROVIDED AND/OR DISCOVERED BY: Tan Chew Keong, Secunia Research.

ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2006-35/

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.