[<prev] [next>] [day] [month] [year] [list]
Message-ID: <44C57D25.40103@vuln.sg>
Date: Tue, 25 Jul 2006 10:08:37 +0800
From: TAN Chew Keong <vulnpost-remove@...n.sg>
To: full-disclosure@...ts.grok.org.uk
Cc: vuln@...unia.com
Subject: [vuln.sg] DynaZip DZIP32.DLL/DZIPS32.DLL Buffer
Overflow Vulnerabilities
[vuln.sg] Vulnerability Research Advisory
DynaZip DZIP32.DLL/DZIPS32.DLL Buffer Overflow Vulnerabilities
by Tan Chew Keong
Release Date: 2006-07-25
Summary
-------
Some vulnerabilities have been found in DynaZip DZIP32.DLL/DZIPS32.DLL.
When exploited, the vulnerabilities allow execution of arbitrary code
when the user fixes (repairs) a malicious ZIP archive, or
add/update/freshen files to a malicious ZIP archive.
Tested Versions
---------------
DynaZip Max (Evaluation Version) with DZIP32.DLL version 5.0.0.7
DynaZip Max Secure (Evaluation Version) with DZIPS32.DLL version 6.0.0.4
Details
-------
http://vuln.sg/dynazip5007-en.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists