WinZip 8.0 uses weak random number generation for password protected ZIP files, which allows local users to brute force the encryption keys and extract the data from the zip file by guessing the state of the stream coder.
References
Configurations
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/3265 - | |
References | () http://www.securityfocus.com/archive/1/311059 - Exploit | |
References | () http://www.securityfocus.com/bid/6805 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11296 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:46
NVD link : CVE-2003-1376
Mitre link : CVE-2003-1376
CVE.ORG link : CVE-2003-1376
JSON object : View
Products Affected
winzip
- winzip
CWE
CWE-255
Credentials Management Errors