Description
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2004-0234 | Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive. |
References
History
No history.
Subscriptions
Clearswift
Subscribe
Mailsweeper
Subscribe
F-secure
Subscribe
F-secure Anti-virus
Subscribe
F-secure For Firewalls
Subscribe
F-secure Internet Security
Subscribe
F-secure Personal Express
Subscribe
Internet Gatekeeper
Subscribe
Rarlab
Subscribe
Winrar
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Fedora Core
Subscribe
Lha
Subscribe
Linux
Subscribe
Sgi
Subscribe
Propack
Subscribe
Stalker
Subscribe
Cgpmcafee
Subscribe
Tsugio Okamoto
Subscribe
Lha
Subscribe
Winzip
Subscribe
Winzip
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:10:03.930Z
Reserved: 2004-03-17T00:00:00.000Z
Link: CVE-2004-0234
No data.
Status : Deferred
Published: 2004-08-18T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-0234
OpenCVE Enrichment
No data.
Weaknesses
EUVD