7-Zip ARJ File Handling Overflow

high Nessus Plugin ID 23750

Synopsis

The remote Windows host contains a library that is affected by a buffer overflow vulnerability.

Description

The remote host contains a version of the open source 7-Zip file archiver and included in third-party products such as Knownsoft's Turbo Searcher.

The version of this software installed on the remote host contains a buffer overflow in its ARJ file handling library that is triggered when handling an ARJ block greater than 2600 bytes. If an attacker can trick a user on the affected host into opening a specially crafted ARJ archive file, he can leverage this issue to execute arbitrary code on the host subject to the user's privileges.

Solution

Either contact the application's vendor for an update or upgrade to 7-Zip 4.27 beta (4.27.0.0) or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2005-45/advisory/

https://www.securityfocus.com/archive/1/411522/30/0/threaded

http://sourceforge.net/project/shownotes.php?release_id=347504

http://vuln.sg/turbosearcher330-en.html

Plugin Details

Severity: High

ID: 23750

File Name: 7zip_arj_large_block_overflow.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 11/30/2006

Updated: 11/15/2018

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:7-zip:7-zip

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 9/23/2005

Vulnerability Publication Date: 9/23/2005

Reference Information

CVE: CVE-2005-3051

BID: 14925, 21208

CWE: 119