Vulnerability Description
Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lhaz | Lhaz | <= 1.31 |
References
- http://secunia.com/advisories/21348ExploitPatchVendor Advisory
- http://securityreason.com/securityalert/1378
- http://vuln.sg/lhaz131-en.htmlExploitPatch
- http://www.chitora.jp/lhaz.html
- http://www.securityfocus.com/archive/1/442445/100/0/threaded
- http://www.securityfocus.com/bid/19377
- http://www.vupen.com/english/advisories/2006/3173
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28282
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28283
- http://secunia.com/advisories/21348ExploitPatchVendor Advisory
- http://securityreason.com/securityalert/1378
- http://vuln.sg/lhaz131-en.htmlExploitPatch
- http://www.chitora.jp/lhaz.html
- http://www.securityfocus.com/archive/1/442445/100/0/threaded
- http://www.securityfocus.com/bid/19377
FAQ
What is CVE-2006-4116?
CVE-2006-4116 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction;...
How severe is CVE-2006-4116?
CVE-2006-4116 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4116?
Check the references section above for vendor advisories and patch information. Affected products include: Lhaz Lhaz.