Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2487 |
Message | SMTP WinZip MIME content-type buffer overflow |
Summary | This event is generated when an attempt is made to exploit a buffer overflow associated with winzip's processing of certain MIME archive files. |
Impact | A successful attack may permit a buffer overflow that allows the execution of arbitrary code at the privilege level of the user running winzip. |
Detailed Information | Winzip is a program that is used for file compression on Windows hosts. A buffer overflow exists when parsing specific header fields for certain MIME file types. An overly long value passed to specific Content-Type attributes may trigger the buffer overflow and allow the execution of arbitrary code in the context of the user running winzip. |
Affected Systems | Winzip 6.x, 7.x, 8.0, 8.1 SR-1, 8.1, Winzip 9.0 beta versions |
Attack Scenarios | An attacker can entice a user to open a malformed MIME file that will invoke winzip to process it, possibly causing a a buffer overflow and the subsequent execution of arbitrary code on the vulnerable host. |
Ease of Attack | Simple. |
Corrective Action | Upgrade to the latest non-affected version of the software. |
Additional References | |
Rule References | bugtraq: 9758 cve: 2004-0333 nessus: 12621 |
--
DID:507384
--
http://www.aanval.com/