7-Zip ARJ File Handling Overflow

High Nessus Plugin ID 23750


The remote Windows host contains a library that is affected by a buffer overflow vulnerability.


The remote host contains a version of the open source 7-Zip file archiver and included in third-party products such as Knownsoft's Turbo Searcher.

The version of this software installed on the remote host contains a buffer overflow in its ARJ file handling library that is triggered when handling an ARJ block greater than 2600 bytes. If an attacker can trick a user on the affected host into opening a specially crafted ARJ archive file, he can leverage this issue to execute arbitrary code on the host subject to the user's privileges.


Either contact the application's vendor for an update or upgrade to 7-Zip 4.27 beta ( or later.

See Also





Plugin Details

Severity: High

ID: 23750

File Name: 7zip_arj_large_block_overflow.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2006/11/30

Modified: 2016/11/11

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:7-zip:7-zip

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/09/23

Vulnerability Publication Date: 2005/09/23

Reference Information

CVE: CVE-2005-3051

BID: 14925, 21208

OSVDB: 19639

CWE: 119