Buffer overflow in Arcext.dll 2.16.1 and earlier in pon software Explzh 5.62 and earlier allows remote attackers to execute arbitrary code via an LZH LHA file with a crafted header that is not properly handled during expansion.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN34729123/index.html | Third Party Advisory Vendor Advisory |
http://www.securityfocus.com/bid/41025 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/40324 | Third Party Advisory Vendor Advisory |
http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000026.html | Third Party Advisory VDB Entry |
http://www.ponsoftware.com/archiver/bug.htm#lzh_bufover | Vendor Advisory |
http://osvdb.org/65666 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/59624 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2010-06-25 11:30
Updated : 2020-08-05 08:35
NVD link : CVE-2010-2434
Mitre link : CVE-2010-2434
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
ponsoftware
- explzh