Vulnerability Note VU#116182
WinZip vulnerable to buffer overflow in handling of MIME archive parameters
A buffer overflow vulnerability in the WinZip program could allow a remote attacker to execute arbitrary code on a vulnerable system.
WinZip Computing, Inc.'s WinZip is a popular utility for creating and extracting a variety of archive file formats on Microsoft Windows-based systems. A buffer overflow error exists in the way that WinZip handles certain parameters of MIME archives.
This error results in a vulnerability when WinZip attempts to interpret invalid data in a MIME-encoded file.
An attacker could execute arbitrary code of their choice on a vulnerable system.
Upgrade to the latest version of the software
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|WinZip||Affected||-||27 Feb 2004|
CVSS Metrics (Learn More)
Thanks to iDefense Security Advisory for reporting this vulnerability.
This document was written by Chad R Dougherty based on information provided by iDefense and WinZip
- CVE IDs: Unknown
- Date Public: 27 Feb 2004
- Date First Published: 01 Mar 2004
- Date Last Updated: 01 Mar 2004
- Severity Metric: 7.70
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.