PicoZip ZipInfo.dll Filename Handling Buffer Overflow

This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by a
buffer overflow.

Description :

The remote host is running PicoZip, a file compression utility for
Windows.

According to the registry, the version of PicoZip installed on the
remote Windows host fails to properly check the size of filenames
before copying them into a finite-sized buffer within the
'zipinfo.dll' info tip shell extension. Using a specially crafted
ACE, RAR, or ZIP file, an attacker may be able to exploit this issue
to execute arbitrary code on the affected host subject to the
privileges of the user running the affected application.

See also :

http://secunia.com/secunia_research/2006-42/advisory/
http://www.picozip.com/changelog.html

Solution :

Upgrade to PicoZip version 4.02 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 21697 ()

Bugtraq ID: 18425

CVE ID: CVE-2006-2909

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now