Buffer overflow in Arcext.dll 2.16.1 and earlier in pon software Explzh 5.62 and earlier allows remote attackers to execute arbitrary code via an LZH LHA file with a crafted header that is not properly handled during expansion.
References
Configurations
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN34729123/index.html - Third Party Advisory, Vendor Advisory | |
References | () http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000026.html - Third Party Advisory, VDB Entry | |
References | () http://osvdb.org/65666 - Broken Link | |
References | () http://secunia.com/advisories/40324 - Third Party Advisory, Vendor Advisory | |
References | () http://www.ponsoftware.com/archiver/bug.htm#lzh_bufover - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/41025 - Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/59624 - Third Party Advisory, VDB Entry |
Information
Published : 2010-06-25 18:30
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2434
Mitre link : CVE-2010-2434
CVE.ORG link : CVE-2010-2434
JSON object : View
Products Affected
ponsoftware
- explzh
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')