First published: Fri Aug 01 2008(Updated: )
WinZip before 11.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinZip WinZip | =7.0 | |
WinZip WinZip | =10.0 | |
WinZip WinZip | =8.1 | |
WinZip WinZip | =9.0 | |
WinZip WinZip | =9.0 | |
WinZip WinZip | =8.1 | |
WinZip WinZip | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3442 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution via man-in-the-middle attacks.
To address CVE-2008-3442, upgrade WinZip to version 11.0 or later, which includes proper verification of update authenticity.
CVE-2008-3442 affects WinZip versions 7.0, 8.0, 8.1, 9.0, and 10.0.
CVE-2008-3442 can be exploited through man-in-the-middle attacks, where attackers can deliver malicious updates.
While firewalls can provide some protection, CVE-2008-3442 specifically allows an attacker to leverage update mechanisms, so remediation through updates is necessary.