VYPR
Unrated severityNVD Advisory· Published Aug 18, 2004· Updated Apr 16, 2026

CVE-2004-0234

CVE-2004-0234

Description

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

Affected products

50
  • cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*+ 13 more
    • cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*
  • F-Secure/Anti Virus18 versions
    cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*+ 17 more
    • cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*
  • cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*
  • cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*
  • cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*
    • cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*
  • cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:lha:1.14i-9:*:i386:*:*:*:*:*
  • Sgi/Propack2 versions
    cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:stalker:cgpmcafee:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*
    • cpe:2.3:a:tsugio_okamoto:lha:1.15:*:*:*:*:*:*:*
    • cpe:2.3:a:tsugio_okamoto:lha:1.17:*:*:*:*:*:*:*
  • cpe:2.3:a:winzip:winzip:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

21

News mentions

0

No linked articles in our index yet.