7.5
CVSSv2

CVE-2005-3862

Published: 29/11/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in unalz prior to 0.53 allows remote malicious users to execute arbitrary code via long file names in ALZ archives.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

unalz unalz 0.31

unalz unalz 0.4

unalz unalz 0.2

unalz unalz 0.22

unalz unalz 0.52

unalz unalz 0.23

unalz unalz 0.3

unalz unalz 0.5

unalz unalz 0.51

Vendor Advisories

Debian Bug report logs - #340842 unalz: buffer overflow when extracting archives Package: unalz; Maintainer for unalz is Debian Korean L10N <debian-l10n-korean@listsdebianorg>; Source for unalz is src:unalz (PTS, buildd, popcon) Reported by: metaur@teliacom Date: Sat, 26 Nov 2005 10:48:02 UTC Severity: grave Tags: patc ...
Ulf Härnhammar from the Debian Security Audit Project discovered that unalz, a decompressor for ALZ archives, performs insufficient bounds checking when parsing file names This can lead to arbitrary code execution if an attacker provides a crafted ALZ archive The old stable distribution (woody) does not contain unalz For the stable distribution ...

Exploits

source: wwwsecurityfocuscom/bid/15577/info The 'unalz' utility is prone to a buffer-overflow vulnerability This issue is exposed when the application extracts an ALZ archive that contains a file with a long name An attacker could exploit this vulnerability to execute arbitrary code in the context of the user who extracts a malicious ar ...