lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200410131112.51794.jstewart@lurhq.com>
From: jstewart at lurhq.com (Joe Stewart)
Subject: EEYE: Windows Shell ZIP File Decompression DUNZIP32.DLL Buffer Overflow Vulnerability

A few things I've noticed with this advisory: eEye states that the 
vulnerability is an overflow in dunzip32.dll and that MS04-034 fixes 
it. However, from what I've seen MS04-034 only patches zipfldr.dll. 
Further, MS04-034 claims that Windows ME is not vulnerable, while eEye 
says it is. Also, eEye says that the dunzip32.dll overflow is an issue 
for XP, yet I am unable to find dunzip32.dll on a stock XP SP1 system. 
Is it possible that the eEye release and the MS04-034 bulletin are 
talking about two separate issues?

-Joe

-- 
Joe Stewart, GCIH 
Senior Security Researcher
LURHQ http://www.lurhq.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ