CVE-2005-2856
Description
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
84- secunia.com/advisories/16479nvdPatchVendor Advisory
- secunia.com/advisories/19454nvdVendor Advisory
- secunia.com/advisories/19458nvdVendor Advisory
- secunia.com/advisories/19581nvdVendor Advisory
- secunia.com/advisories/19834nvdVendor Advisory
- secunia.com/advisories/19890nvdVendor Advisory
- secunia.com/advisories/19938nvdVendor Advisory
- secunia.com/advisories/19967nvdVendor Advisory
- secunia.com/advisories/19975nvdVendor Advisory
- secunia.com/advisories/19977nvdVendor Advisory
- secunia.com/advisories/20009nvdVendor Advisory
- secunia.com/secunia_research/2006-24/advisorynvdVendor Advisory
- secunia.com/secunia_research/2006-25/advisorynvdVendor Advisory
- secunia.com/secunia_research/2006-27/nvdVendor Advisory
- secunia.com/secunia_research/2006-28/advisorynvdVendor Advisory
- secunia.com/secunia_research/2006-29/advisory/nvdVendor Advisory
- secunia.com/secunia_research/2006-30/advisorynvdVendor Advisory
- secunia.com/secunia_research/2006-33/advisory/nvdVendor Advisory
- secunia.com/secunia_research/2006-36/advisorynvdVendor Advisory
- secunia.com/secunia_research/2006-38/advisorynvdVendor Advisory
- marc.infonvd
- secunia.com/advisories/19596nvd
- secunia.com/advisories/19612nvd
- secunia.com/advisories/19931nvd
- secunia.com/advisories/19939nvd
- secunia.com/advisories/20270nvd
- secunia.com/secunia_research/2005-41/advisory/nvd
- secunia.com/secunia_research/2006-32/advisory/nvd
- secunia.com/secunia_research/2006-46/advisory/nvd
- secunia.com/secunia_research/2006-50/advisory/nvd
- securityreason.com/securityalert/49nvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- securitytracker.com/idnvd
- www.osvdb.org/25129nvd
- www.securityfocus.com/archive/1/432357/100/0/threadednvd
- www.securityfocus.com/archive/1/432579/100/0/threadednvd
- www.securityfocus.com/archive/1/433258/100/0/threadednvd
- www.securityfocus.com/archive/1/433352/100/0/threadednvd
- www.securityfocus.com/archive/1/433693/100/0/threadednvd
- www.securityfocus.com/archive/1/434011/100/0/threadednvd
- www.securityfocus.com/archive/1/434234/100/0/threadednvd
- www.securityfocus.com/archive/1/434279/100/0/threadednvd
- www.securityfocus.com/archive/1/436639/100/0/threadednvd
- www.securityfocus.com/archive/1/440303/100/0/threadednvd
- www.securityfocus.com/bid/14759nvd
- www.securityfocus.com/bid/19884nvd
- www.vupen.com/english/advisories/2006/1565nvd
- www.vupen.com/english/advisories/2006/1577nvd
- www.vupen.com/english/advisories/2006/1611nvd
- www.vupen.com/english/advisories/2006/1681nvd
- www.vupen.com/english/advisories/2006/1694nvd
- www.vupen.com/english/advisories/2006/1725nvd
- www.vupen.com/english/advisories/2006/1775nvd
- www.vupen.com/english/advisories/2006/1797nvd
- www.vupen.com/english/advisories/2006/1835nvd
- www.vupen.com/english/advisories/2006/1836nvd
- www.vupen.com/english/advisories/2006/2047nvd
- www.vupen.com/english/advisories/2006/2184nvd
- www.vupen.com/english/advisories/2006/2824nvd
- www.vupen.com/english/advisories/2006/3495nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26116nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26142nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26168nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26272nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26302nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26315nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26385nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26447nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26479nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26480nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26736nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/26982nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/27763nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/28787nvd
News mentions
0No linked articles in our index yet.