Vulnerabilities > CVE-2006-2909 - Buffer Overflow vulnerability in Picozip 4.01
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Stack-based buffer overflow in the info tip shell extension (zipinfo.dll) in PicoZip 4.01 allows remote attackers to execute arbitrary code via a long filename in an (1) ACE, (2) RAR, or (3) ZIP archive, which is triggered when the user moves the mouse over the archive.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Pico Zip 4.01 (Long Filename) Buffer Overflow Exploit. CVE-2006-2909. Local exploit for windows platform |
id | EDB-ID:1917 |
last seen | 2016-01-31 |
modified | 2006-06-15 |
published | 2006-06-15 |
reporter | c0rrupt |
source | https://www.exploit-db.com/download/1917/ |
title | Pico Zip 4.01 Long Filename Buffer Overflow Exploit |
Nessus
NASL family | Windows |
NASL id | PICOZIP_ZIPINFO_OVERFLOW.NASL |
description | The remote host is running PicoZip, a file compression utility for Windows. According to the registry, the version of PicoZip installed on the remote Windows host fails to properly check the size of filenames before copying them into a finite-sized buffer within the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21697 |
published | 2006-06-15 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21697 |
title | PicoZip ZipInfo.dll Filename Handling Buffer Overflow |
code |
|
References
- http://secunia.com/advisories/20481
- http://secunia.com/secunia_research/2006-42/advisory/
- http://securityreason.com/securityalert/1104
- http://securitytracker.com/id?1016308
- http://www.osvdb.org/26447
- http://www.picozip.com/changelog.html
- http://www.securityfocus.com/archive/1/437103/100/0/threaded
- http://www.securityfocus.com/archive/1/437450/100/100/threaded
- http://www.securityfocus.com/bid/18425
- http://www.vupen.com/english/advisories/2006/2330
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27096