First published: Wed May 05 2004(Updated: )
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Clearswift MAILsweeper Business Suite | =4.0 | |
Clearswift MAILsweeper Business Suite | =4.1 | |
Clearswift MAILsweeper Business Suite | =4.2 | |
Clearswift MAILsweeper Business Suite | =4.3 | |
Clearswift MAILsweeper Business Suite | =4.3.3 | |
Clearswift MAILsweeper Business Suite | =4.3.4 | |
Clearswift MAILsweeper Business Suite | =4.3.5 | |
Clearswift MAILsweeper Business Suite | =4.3.6 | |
Clearswift MAILsweeper Business Suite | =4.3.6_sp1 | |
Clearswift MAILsweeper Business Suite | =4.3.7 | |
Clearswift MAILsweeper Business Suite | =4.3.8 | |
Clearswift MAILsweeper Business Suite | =4.3.10 | |
Clearswift MAILsweeper Business Suite | =4.3.11 | |
Clearswift MAILsweeper Business Suite | =4.3.13 | |
F-Secure Anti-Virus | =4.51 | |
F-Secure Anti-Virus | =4.51 | |
F-Secure Anti-Virus | =4.51 | |
F-Secure Anti-Virus | =4.52 | |
F-Secure Anti-Virus | =4.52 | |
F-Secure Anti-Virus | =4.52 | |
F-Secure Anti-Virus | =4.60 | |
F-Secure Anti-Virus | =5.5 | |
F-Secure Anti-Virus | =5.41 | |
F-Secure Anti-Virus | =5.41 | |
F-Secure Anti-Virus | =5.41 | |
F-Secure Anti-Virus | =5.42 | |
F-Secure Anti-Virus | =5.42 | |
F-Secure Anti-Virus | =5.42 | |
F-Secure Anti-Virus | =5.52 | |
F-Secure Anti-Virus | =6.21 | |
F-Secure Anti-Virus | =2003 | |
F-Secure Anti-Virus | =2004 | |
F-Secure for Firewalls | =6.20 | |
F-Secure Internet Security 2010 | =2003 | |
F-Secure Internet Security 2010 | =2004 | |
F-Secure Personal Express | =4.5 | |
F-Secure Personal Express | =4.6 | |
F-Secure Personal Express | =4.7 | |
F-Secure Internet GateKeeper for Windows | =6.31 | |
F-Secure Internet GateKeeper for Windows | =6.32 | |
WinRAR | =3.20 | |
Red Hat LHA | =1.14i-9 | |
SGI ProPack | =2.4 | |
SGI ProPack | =3.0 | |
stalker cgpmcafee | =3.2 | |
LHA (by Tsugio Okamoto) | =1.14 | |
LHA (by Tsugio Okamoto) | =1.15 | |
LHA (by Tsugio Okamoto) | =1.17 | |
Corel WinZip | =9.0 | |
Red Hat Fedora Core | =core_1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0234 is considered to have a high severity as it may allow remote attackers to execute arbitrary code.
To fix CVE-2004-0234, it is recommended to update to the latest version of LHA or the affected software products.
CVE-2004-0234 affects multiple products including Clearswift MAILsweeper and various versions of F-Secure Antivirus.
The vulnerability in CVE-2004-0234 is due to multiple stack-based buffer overflows in the get_header function.
Yes, CVE-2004-0234 can also be exploited by local users through long directory or file names in an LHA archive.