First published: Thu Mar 18 2004(Updated: )
Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote attackers to execute arbitrary code via a MIME archive with certain long MIME parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinZip WinZip | =7.0 | |
WinZip WinZip | =8.1-sr1 | |
UUDeview | =0.5.18 | |
WinZip WinZip | =8.1 | |
UUDeview | =0.5.19 | |
openpkg openpkg | ||
WinZip WinZip | =8.0 | |
Gentoo Linux | =1.4-rc1 | |
Gentoo Linux | =1.4-rc3 | |
Gentoo Linux | =1.4 | |
Gentoo Linux | =1.4-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0333 is considered a critical vulnerability due to its potential to allow remote arbitrary code execution.
To mitigate CVE-2004-0333, users should update to the latest version of WinZip or UUDeview that addresses this buffer overflow issue.
CVE-2004-0333 affects WinZip versions 6.2 to 8.1 SR-1 and UUDeview versions 0.5.18 and 0.5.19.
CVE-2004-0333 allows remote attackers to execute arbitrary code by exploiting a buffer overflow through specially crafted MIME archives.
Yes, patches or updated versions that resolve CVE-2004-0333 are available from the software providers.