2025-04-03 02:06:18 +00:00

168 lines
4.9 KiB
JSON

{
"id": "CVE-2006-4116",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-14T21:04:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en Lhaz anterior a 1.32 permite a atacantes con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante un nombre de archivo largo en (1) un archivo LHZ, cuando se guarda el nombre de archivo durante la extracci\u00f3n; y (2) un archivo LHZ con una suma de comprobaci\u00f3n CRC inv\u00e1lida, cuando se construye un mensaje de error."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"baseScore": 5.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lhaz:lhaz:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.31",
"matchCriteriaId": "400B507D-632F-4ED6-BF16-5F79DAB07A89"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/21348",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1378",
"source": "cve@mitre.org"
},
{
"url": "http://vuln.sg/lhaz131-en.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.chitora.jp/lhaz.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/442445/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/19377",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3173",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/21348",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/1378",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://vuln.sg/lhaz131-en.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.chitora.jp/lhaz.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/442445/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/19377",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3173",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28282",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28283",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
],
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nLhaz, Lhaz, 1.32"
}