ZipGenius多个文档格式文件名溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1197505 漏洞类型 缓冲区溢出
发布时间 2005-10-27 更新时间 2009-03-25
CVE编号 CVE-2005-3317 CNNVD-ID CNNVD-200510-244
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2005100050
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200510-244
|漏洞详情
ZipGenius是一款免费易用的文档压缩解压工具。ZipGenius在解析各种文档格式时存在多个溢出漏洞:1)zipgenius.exe、zg.exe、zgtips.dll和contmenu.dll在从ZIP文档读取压缩文件的文件名时存在边界错误,在ZipGenius中或从Windows资源管理器中读取包含有超长文件名的恶意文档时就会导致栈溢出。2)zipgenius.exe在处理UUE/XXE/MIM编码文件的原始名称时存在边界错误,在打开包含有超长文件名编码文件的恶意UUE/XXE/MIM文档时会导致栈溢出。3)unacev2.dll在解压包含有超长文件名的ACE文档时存在边界错误,在使用zipgenius.exe或zg.exe解压恶意的ACE文档时会导致栈溢出。成功利用这个漏洞的攻击者可以利用这些漏洞完全入侵用户的系统。
|漏洞EXP
======================================================================

Secunia Research 21/10/2005

- ZipGenius Multiple Archive Handling Buffer Overflow -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software

ZipGenius Version 5.5.1.468 and 6.0.2.1041.

Prior versions may also be affected.

====================================================================== 
2) Severity

Rating: Moderately Critical
Impact: System access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered some vulnerabilities in ZipGenius,
which can be exploited by malicious people to compromise a user's
system.

1) A boundary error exists in "zipgenius.exe", "zg.exe", "zgtips.dll",
and "contmenu.dll" when reading the filename of a compressed file
from a ZIP archive. This can be exploited to cause a stack-based
buffer overflow when a malicious archive containing a file with an
overly long filename is read either in ZipGenius or from Windows
Explorer.

2) A boundary error exists in "zipgenius.exe" when handling the 
original name of a UUE/XXE/MIM encoded file. This can be exploited
to cause a stack-based buffer overflow when a malicious UUE/XXE/MIM 
archive containing an encoded file with an overly long filename is 
opened.

3) A boundary error exists in "unacev2.dll" when extracting an ACE 
archive containing a file with an overly long filename. This can be 
exploited to cause a stack-based buffer overflow when a malicious
ACE archive is extracted using "zipgenius.exe" or "zg.exe".

Vulnerability #3 is related to:
SA14359

====================================================================== 
4) Solution

Update to version 6.0.2.1050.

====================================================================== 
5) Time Table

04/10/2005 - Initial vendor notification.
05/10/2005 - Initial vendor reply.
20/10/2005 - Vendor released fixed version.
21/10/2005 - Public disclosure.

====================================================================== 
6) Credits

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

ZipGenius:
http://forum.zipgenius.it/index.php?showtopic=684

====================================================================== 
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2005-54/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================
|参考资料

来源:BID
名称:15161
链接:http://www.securityfocus.com/bid/15161
来源:BUGTRAQ
名称:20051021SecuniaResearch:ZipGeniusMultipleArchiveHandlingBufferOverflow
链接:http://www.securityfocus.com/archive/1/414083
来源:OSVDB
名称:20159
链接:http://www.osvdb.org/20159
来源:OSVDB
名称:20158
链接:http://www.osvdb.org/20158
来源:OSVDB
名称:20157
链接:http://www.osvdb.org/20157
来源:SECTRACK
名称:1015090
链接:http://securitytracker.com/id?1015090
来源:SREASON
名称:103
链接:http://securityreason.com/securityalert/103
来源:MISC
链接:http://secunia.com/secunia_research/2005-54/advisory
来源:SECUNIA
名称:17061
链接:http://secunia.com/advisories/17061
来源:forum.zipgenius.it
链接:http://forum.zipgenius.it/index.php?showtopic=684