2024-07-14 02:06:08 +00:00

469 lines
12 KiB
JSON

{
"id": "CVE-2005-2856",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-09-08T10:03:00.000",
"lastModified": "2018-10-19T15:33:53.357",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:winace:winace:2.6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "64D2B1B2-B49D-4F22-B4C6-CE0FAF0FDF35"
}
]
}
]
}
],
"references": [
{
"url": "http://marc.info/?l=bugtraq&m=112621008228458&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/16479",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19454",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19458",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19581",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19596",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/19612",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/19834",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19890",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19931",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/19938",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19939",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/19967",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19975",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19977",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/20009",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/20270",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/secunia_research/2005-41/advisory/",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/secunia_research/2006-24/advisory",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-25/advisory",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-27/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-28/advisory",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-29/advisory/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-30/advisory",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-32/advisory/",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/secunia_research/2006-33/advisory/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-36/advisory",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-38/advisory",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/secunia_research/2006-46/advisory/",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/secunia_research/2006-50/advisory/",
"source": "cve@mitre.org"
},
{
"url": "http://securityreason.com/securityalert/49",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1014863",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1015852",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016011",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016012",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016065",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016066",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016088",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016114",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016115",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016177",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016257",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016512",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/25129",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/432357/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/432579/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/433258/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/433352/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/433693/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/434011/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/434234/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/434279/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/436639/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/440303/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/14759",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/19884",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1565",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1577",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1611",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1681",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1694",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1725",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1775",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1797",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1835",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/1836",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/2047",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/2184",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/2824",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3495",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26116",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26142",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26168",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26272",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26302",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26315",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26385",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26447",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26479",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26480",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26736",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26982",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27763",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28787",
"source": "cve@mitre.org"
}
]
}