lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 31 Dec 2006 05:24:55 -0000
From: 76693223@....com
To: bugtraq@...urityfocus.com
Subject: WinZip10.0 FileView ActiveX Controls CreateNewFolderFromName
 Method Buffer overflow

The first flaw is due to errors in the "WZFILEVIEW.FileViewCtrl.61" ActiveX control that does not validate input passed to CreateNewFolderFromName methods,When you pass a long string(length>235),It will bead to buffer overflow .which could be exploited by remote attackers to execute arbitrary commands by tricking a user into visiting a specially crafted web page.
   Because of the prior vuln in FileView ActiveX Control,Micorsoft has disabled this ActiveX Controls,
		     To test this vuln,You can delete the key:
		     [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{A09AE68F-B14D-43ED-B713-BA413F034904}]
         "Compatibility Flags"=dword:00000400
         I have test the exploit on Windows 2000+sp4(CN) and Windows xp+sp2(CN) and Winzip 10.0(6667),you can try other version.

Powered by blists - more mailing lists