First published: Thu Sep 08 2005(Updated: )
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinAce | =2.6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2856 is classified as a high severity vulnerability due to its potential for exploitation via stack-based buffer overflow.
To mitigate CVE-2005-2856, update to WinACE version 2.6.0.0 or later, which addresses this vulnerability.
CVE-2005-2856 affects multiple products that utilize the WinACE UNACEV2.DLL compression utility, specifically versions below 2.6.0.0.
CVE-2005-2856 is a stack-based buffer overflow vulnerability that can lead to arbitrary code execution.
Yes, CVE-2005-2856 can potentially be exploited remotely through crafted archive files.