SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Compressed Folders Vendors:   Microsoft
Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1011637
SecurityTracker URL:  http://securitytracker.com/id/1011637
CVE Reference:   CVE-2004-0575   (Links to External Site)
Updated:  May 5 2009
Original Entry Date:  Oct 12 2004
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Windows XP, XP SP1, 2003
Description:   A buffer overflow vulnerability was reported in Microsoft Windows 2003 and XP in the processing of compressed folders. A remote user may be able to cause the target user to execute arbitrary code.

The vendor reported that a remote user or local user can create a specially crafted compressed folder (zip file) that, when viewed by the target user, will execute arbitrary code. The code will run with the privileges of the target user.

eEye Digital Security reported that the flaw is due to an integer overflow, triggered by a long file name that is greater than approximately 0x8000 bytes.

Microsoft credits eEye Digital Security with reporting this vulnerability.

The vendor was notified on August 2, 2004.

Impact:   A remote user can create a folder that, when viewed by the target user, will execute arbitrary code on the target user's system with the privileges of the target user.
Solution:   The vendor has released a fix.

Microsoft Windows XP and Microsoft Windows XP Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=6B70BA00-56D1-4314-8F53-F8355A6861D3

Microsoft Windows XP 64-Bit Edition Service Pack 1:

http://www.microsoft.com/downloads/details.aspx?FamilyId=3F6896F3-F055-438D-93CE-CD15F37264CB


Microsoft Windows XP 64-Bit Edition Version 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=4B63EF24-D0E4-4005-8E23-2F5EC24BE63F


Microsoft Windows Server 2003:

http://www.microsoft.com/downloads/details.aspx?FamilyId=0903569E-7F3D-4846-A1DC-78734E77D3A9


Microsoft Windows Server 2003 64-Bit Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=4B63EF24-D0E4-4005-8E23-2F5EC24BE63F

In some cases, a system restart is not required.

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms04-034.mspx (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC