Vulnerability Note VU#649374
Microsoft Windows processing of zip files contains a buffer overflow
A buffer overflow exists in the way Microsoft Windows processes zip files that may allow remote code execution.
Microsoft Windows XP and Windows Server 2003 feature the ability to natively handle zip files. Microsoft has released bulletin MS04-034 describing a remotely exploitable buffer overflow vulnerability in the way Windows handles zip files. According to MS04-034:
A remote code execution vulnerability exists in Compressed (zipped) Folders because of an unchecked buffer in the way that it handles specially crafted compressed files. An attacker could exploit the vulnerability by constructing a malicious compressed file that could potentially allow remote code execution if a user visited a malicious Web site. An attacker who successfully exploited this vulnerability could take complete control of an affected system. However, user interaction is required to exploit this vulnerability.
For further technical information about this vulnerability, please see Microsoft Security Bulletin MS04-034.
If a remote attacker can persuade a user to access a specially crafted zip file, the attacker may be able to execute arbitrary code on that user's system, possibly with administrator privileges.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||13 Oct 2004|
CVSS Metrics (Learn More)
Microsoft has published Microsoft Security Bulletin MS04-034 to address this vulnerability.
Microsoft credits eEye Digital Security for reporting this vulnerability.
This document was written by Jeff Gennari.
- CVE IDs: CAN-2004-0575
- Date Public: 12 Oct 2004
- Date First Published: 13 Oct 2004
- Date Last Updated: 14 Oct 2004
- Severity Metric: 27.11
- Document Revision: 95
If you have feedback, comments, or additional information about this vulnerability, please send us email.