Total Commander 6.x - 'unacev2.dll' 缓冲区溢出漏洞 (PoC)

admin 2023-12-15 18:23:39 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
Total Commander 6.x - 'unacev2.dll' 缓冲区溢出漏洞 (PoC)

CVE编号

CVE-2005-2856

利用情况

暂无

补丁情况

N/A

披露时间

2005-09-08
漏洞描述
在2.6.0.0之前的WinACE UNACEV2.DLL第三方压缩实用程序中基于堆栈的缓冲区溢出,用于多种产品,包括(1)ALZip 5.51至6.11,(2)Servant Salamander 2.0和2.5 Beta 1,(3)WinHKI 1.66和1.67,(4)ExtractNow 3.x,(5)Total Commander 6.53,(6)Anti-Trojan 5.5.421,(7)9.61之前的PowerArchiver,(8)UltimateZip 2.7、1、3.0.3和3.1 b,(9)在哪里(WhereIsIt)3.73.501,(10)FilZip 3.04,(11)IZArc 3.5 beta3,(12)Eazel 1.0,(13)Rising Antivirus 18.27.21和更早版本,(14)AutoMate 6.1 .0.0,(15)BitZipper 4.1 SR-1,(16)ZipTV和其他产品,允许用户协助的攻击者通过ACE archive中的长文件名执行任意代码。
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://marc.info/?l=bugtraq&m=112621008228458&w=2
http://secunia.com/advisories/16479
http://secunia.com/advisories/19454
http://secunia.com/advisories/19458
http://secunia.com/advisories/19581
http://secunia.com/advisories/19596
http://secunia.com/advisories/19612
http://secunia.com/advisories/19834
http://secunia.com/advisories/19890
http://secunia.com/advisories/19931
http://secunia.com/advisories/19938
http://secunia.com/advisories/19939
http://secunia.com/advisories/19967
http://secunia.com/advisories/19975
http://secunia.com/advisories/19977
http://secunia.com/advisories/20009
http://secunia.com/advisories/20270
http://secunia.com/secunia_research/2005-41/advisory/
http://secunia.com/secunia_research/2006-24/advisory
http://secunia.com/secunia_research/2006-25/advisory
http://secunia.com/secunia_research/2006-27/
http://secunia.com/secunia_research/2006-28/advisory
http://secunia.com/secunia_research/2006-29/advisory/
http://secunia.com/secunia_research/2006-30/advisory
http://secunia.com/secunia_research/2006-32/advisory/
http://secunia.com/secunia_research/2006-33/advisory/
http://secunia.com/secunia_research/2006-36/advisory
http://secunia.com/secunia_research/2006-38/advisory
http://secunia.com/secunia_research/2006-46/advisory/
http://secunia.com/secunia_research/2006-50/advisory/
http://securityreason.com/securityalert/49
http://securitytracker.com/id?1014863
http://securitytracker.com/id?1015852
http://securitytracker.com/id?1016011
http://securitytracker.com/id?1016012
http://securitytracker.com/id?1016065
http://securitytracker.com/id?1016066
http://securitytracker.com/id?1016088
http://securitytracker.com/id?1016114
http://securitytracker.com/id?1016115
http://securitytracker.com/id?1016177
http://securitytracker.com/id?1016257
http://securitytracker.com/id?1016512
http://www.osvdb.org/25129
http://www.securityfocus.com/archive/1/432357/100/0/threaded
http://www.securityfocus.com/archive/1/432579/100/0/threaded
http://www.securityfocus.com/archive/1/433258/100/0/threaded
http://www.securityfocus.com/archive/1/433352/100/0/threaded
http://www.securityfocus.com/archive/1/433693/100/0/threaded
http://www.securityfocus.com/archive/1/434011/100/0/threaded
http://www.securityfocus.com/archive/1/434234/100/0/threaded
http://www.securityfocus.com/archive/1/434279/100/0/threaded
http://www.securityfocus.com/archive/1/436639/100/0/threaded
http://www.securityfocus.com/archive/1/440303/100/0/threaded
http://www.securityfocus.com/bid/14759
http://www.securityfocus.com/bid/19884
http://www.vupen.com/english/advisories/2006/1565
http://www.vupen.com/english/advisories/2006/1577
http://www.vupen.com/english/advisories/2006/1611
http://www.vupen.com/english/advisories/2006/1681
http://www.vupen.com/english/advisories/2006/1694
http://www.vupen.com/english/advisories/2006/1725
http://www.vupen.com/english/advisories/2006/1775
http://www.vupen.com/english/advisories/2006/1797
http://www.vupen.com/english/advisories/2006/1835
http://www.vupen.com/english/advisories/2006/1836
http://www.vupen.com/english/advisories/2006/2047
http://www.vupen.com/english/advisories/2006/2184
http://www.vupen.com/english/advisories/2006/2824
http://www.vupen.com/english/advisories/2006/3495
https://exchange.xforce.ibmcloud.com/vulnerabilities/26116
https://exchange.xforce.ibmcloud.com/vulnerabilities/26142
https://exchange.xforce.ibmcloud.com/vulnerabilities/26168
https://exchange.xforce.ibmcloud.com/vulnerabilities/26272
https://exchange.xforce.ibmcloud.com/vulnerabilities/26302
https://exchange.xforce.ibmcloud.com/vulnerabilities/26315
https://exchange.xforce.ibmcloud.com/vulnerabilities/26385
https://exchange.xforce.ibmcloud.com/vulnerabilities/26447
https://exchange.xforce.ibmcloud.com/vulnerabilities/26479
https://exchange.xforce.ibmcloud.com/vulnerabilities/26480
https://exchange.xforce.ibmcloud.com/vulnerabilities/26736
https://exchange.xforce.ibmcloud.com/vulnerabilities/26982
https://exchange.xforce.ibmcloud.com/vulnerabilities/27763
https://exchange.xforce.ibmcloud.com/vulnerabilities/28787
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 winace winace 2.6.0.0 -
CVSS3评分 7.5
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 无
  • 影响范围 N/A
  • 用户交互 无
  • 可用性 部分地
  • 保密性 部分地
  • 完整性 部分地
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-ID 漏洞类型
CWE-119 内存缓冲区边界内操作的限制不恰当
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0