SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   WinHKI Vendors:   WinHKI.com
WinHKI Buffer Overflow in 'ztvunacev2.dll' Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1016012
SecurityTracker URL:  http://securitytracker.com/id/1016012
CVE Reference:   CVE-2005-2856   (Links to External Site)
Updated:  Aug 15 2009
Original Entry Date:  May 1 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.66, 1.67; possibly earlier versions
Description:   A vulnerability was reported in WinHKI. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create an ACE archive with a specially crafted filename that, when extracted by the target user, will trigger a buffer overflow in 'ztvunacev2.dll' (UNACEV2.DLL) and execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

The vendor was notified on March 30, 2006.

Tan Chew Keong of Secunia Research discovered this vulnerability.

Impact:   A remote user can cause arbitrary code to be executed on the target user's system.
Solution:   The vendor has issued a fixed version (1.68), available at:

http://www.winhki.com/en/download.htm

Vendor URL:  www.winhki.com/en/index.htm (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [Full-disclosure] Secunia Research: WinHKI unacev2.dll Buffer

====================================================================== 

                    Secunia Research 01/05/2006

       - WinHKI unacev2.dll Buffer Overflow Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software 

* WinHKI version 1.66 and 1.67. 

Prior versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderately Critical
Impact: System Access
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in WinHKI, which can
be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error in ztvunacev2.dll
(UNACEV2.DLL) when extracting an ACE archive containing a file with
an overly long filename. This can be exploited to cause a stack-based
buffer overflow when a user extracts a specially crafted ACE archive.

The vulnerability is related to:
SA16479

====================================================================== 
4) Solution 

Update to version 1.68.
http://www.winhki.com/en/download.htm

====================================================================== 
5) Time Table 

30/03/2006 - Initial vendor notification.
01/04/2006 - Initial vendor reply.
01/05/2006 - Public disclosure.

====================================================================== 
6) Credits 

Discovered by Tan Chew Keong, Secunia Research.

====================================================================== 
7) References

SA16479:
http://secunia.com/advisories/16479/

====================================================================== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-25/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC