7-Zip ARJ File Handling Overflow

high Nessus Plugin ID 23750


The remote Windows host contains a library that is affected by a buffer overflow vulnerability.


The remote host contains a version of the open source 7-Zip file archiver and included in third-party products such as Knownsoft's Turbo Searcher.

The version of this software installed on the remote host contains a buffer overflow in its ARJ file handling library that is triggered when handling an ARJ block greater than 2600 bytes. If an attacker can trick a user on the affected host into opening a specially crafted ARJ archive file, he can leverage this issue to execute arbitrary code on the host subject to the user's privileges.


Either contact the application's vendor for an update or upgrade to 7-Zip 4.27 beta ( or later.

See Also





Plugin Details

Severity: High

ID: 23750

File Name: 7zip_arj_large_block_overflow.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 11/30/2006

Updated: 11/15/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:7-zip:7-zip

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 9/23/2005

Vulnerability Publication Date: 9/23/2005

Reference Information

CVE: CVE-2005-3051

BID: 14925, 21208

CWE: 119