SECUNIA ADVISORY ID:
Tan Chew Keong has reported a vulnerability in PowerZip, which can be
exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the handling
of filenames in ZIP archives. This can be exploited to cause a
stack-based buffer overflow when a malicious ZIP archive containing a
file with an overly long filename is opened.
Successful exploitation allows execution of arbitrary code.
The vulnerability has been reported in version 7.06 Build 3895. Prior
versions may also be affected.
Update to version 7.07 Build 3901.
PROVIDED AND/OR DISCOVERED BY:
Tan Chew Keong
- Vulnerability in Internet Explorer with MS-042 update installed -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)
Madrid, August 23 2006 - Last Monday we covered an error detected after installation of update MS06-042, which caused Windows XP SP1 and Windows 2000 SP4 users to report errors when browsing certain web pages with Internet Explorer 6. However, this error seems to have far more serious consequences and could even be exploited remotely.
According to http://www.securitytracker.com/alerts/2006/Aug/1016731.html and http://research.eeye.com/html/alerts/AL20060822.html, when the MS06-042 update is installed, a vulnerability appears in Internet Explorer that could allow remote attackers to compromise systems. This flaw stems from a boundary error when treating URLs with HTTP 1.1 with compression. This could be exploited to cause a buffer overflow by using a very large URL.
To fix this, it is advisable to disable protocol HTTP 1.1 in Internet Explorer. Go to the "Tools" menu and click on "Internet Options...". Select the "Advanced" tab and uncheck the "Use HTTP 1.1" and "Use HTTP 1.1 through proxy connections" boxes.