Required CVE Record Information
Description
Stack-based buffer overflow in the ARJ plugin (arj.dll) 3.9.2.0 for 7-Zip 3.13, 4.23, and 4.26 BETA, as used in products including Turbo Searcher, allows remote attackers to execute arbitrary code via a large ARJ block.
References 10 Total
- securityfocus.com: 14925 vdb-entry
- http://secunia.com/secunia_research/2005-45/advisory/
- exchange.xforce.ibmcloud.com: turbo-searcher-arj-bo(30438) vdb-entry
- vupen.com: ADV-2006-4603 vdb-entry
- securitytracker.com: 1017261 vdb-entry
- http://www.vuln.sg/turbosearcher330-en.html
- securityfocus.com: 21208 vdb-entry
- secunia.com: 23004 third-party-advisory
- secunia.com: 16664 third-party-advisory
- marc.info: 20050923 Secunia Research: 7-Zip ARJ Archive Handling Buffer Overflow mailing-list
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 10 Total
- securityfocus.com: 14925 vdb-entryx_transferred
- http://secunia.com/secunia_research/2005-45/advisory/ x_transferred
- exchange.xforce.ibmcloud.com: turbo-searcher-arj-bo(30438) vdb-entryx_transferred
- vupen.com: ADV-2006-4603 vdb-entryx_transferred
- securitytracker.com: 1017261 vdb-entryx_transferred
- http://www.vuln.sg/turbosearcher330-en.html x_transferred
- securityfocus.com: 21208 vdb-entryx_transferred
- secunia.com: 23004 third-party-advisoryx_transferred
- secunia.com: 16664 third-party-advisoryx_transferred
- marc.info: 20050923 Secunia Research: 7-Zip ARJ Archive Handling Buffer Overflow mailing-listx_transferred