Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

WinZip MIME Archive Parsing Buffer Overflow Vulnerability

Feb 27, 2004 1:31AM PST

Secunia Advisory: SA10995
Release Date: 2004-02-27

Critical: Moderately critical
Impact: System access

Where: From remote

Software: WinZip 6.x
WinZip 7.x
WinZip 8.x
WinZip 9.x

Description:
iDEFENSE has reported a vulnerability in WinZip, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error in the UUDeview package within a parameter parsing routine. This can be exploited to cause a buffer overflow by tricking a user into opening a specially crafted MIME archive (".mim", ".uue", ".uu", ".b64", ".bhx", ".hqx", and ".xxe" file extensions) containing overly long strings to certain parameters.

Successful exploitation may allow execution of arbitrary code on a user's system with the user's privileges.

The vulnerability affects WinZip 6.2 up to and including the latest beta release of 9.0.

Solution:
The vulnerability has been fixed in WinZip 9.0.
http://www.winzip.com/

Provided and/or discovered by:
iDEFENSE

http://secunia.com/advisories/10995/

Discussion is locked