Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
References
Link Providers
http://marc.info/?l=bugtraq&m=112621008228458&w=2 cve-icon cve-icon
http://secunia.com/advisories/16479 cve-icon cve-icon
http://secunia.com/advisories/19454 cve-icon cve-icon
http://secunia.com/advisories/19458 cve-icon cve-icon
http://secunia.com/advisories/19581 cve-icon cve-icon
http://secunia.com/advisories/19596 cve-icon cve-icon
http://secunia.com/advisories/19612 cve-icon cve-icon
http://secunia.com/advisories/19834 cve-icon cve-icon
http://secunia.com/advisories/19890 cve-icon cve-icon
http://secunia.com/advisories/19931 cve-icon cve-icon
http://secunia.com/advisories/19938 cve-icon cve-icon
http://secunia.com/advisories/19939 cve-icon cve-icon
http://secunia.com/advisories/19967 cve-icon cve-icon
http://secunia.com/advisories/19975 cve-icon cve-icon
http://secunia.com/advisories/19977 cve-icon cve-icon
http://secunia.com/advisories/20009 cve-icon cve-icon
http://secunia.com/advisories/20270 cve-icon cve-icon
http://secunia.com/secunia_research/2005-41/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2006-24/advisory cve-icon cve-icon
http://secunia.com/secunia_research/2006-25/advisory cve-icon cve-icon
http://secunia.com/secunia_research/2006-27/ cve-icon cve-icon
http://secunia.com/secunia_research/2006-28/advisory cve-icon cve-icon
http://secunia.com/secunia_research/2006-29/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2006-30/advisory cve-icon cve-icon
http://secunia.com/secunia_research/2006-32/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2006-33/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2006-36/advisory cve-icon cve-icon
http://secunia.com/secunia_research/2006-38/advisory cve-icon cve-icon
http://secunia.com/secunia_research/2006-46/advisory/ cve-icon cve-icon
http://secunia.com/secunia_research/2006-50/advisory/ cve-icon cve-icon
http://securityreason.com/securityalert/49 cve-icon cve-icon
http://securitytracker.com/id?1014863 cve-icon cve-icon
http://securitytracker.com/id?1015852 cve-icon cve-icon
http://securitytracker.com/id?1016011 cve-icon cve-icon
http://securitytracker.com/id?1016012 cve-icon cve-icon
http://securitytracker.com/id?1016065 cve-icon cve-icon
http://securitytracker.com/id?1016066 cve-icon cve-icon
http://securitytracker.com/id?1016088 cve-icon cve-icon
http://securitytracker.com/id?1016114 cve-icon cve-icon
http://securitytracker.com/id?1016115 cve-icon cve-icon
http://securitytracker.com/id?1016177 cve-icon cve-icon
http://securitytracker.com/id?1016257 cve-icon cve-icon
http://securitytracker.com/id?1016512 cve-icon cve-icon
http://www.osvdb.org/25129 cve-icon cve-icon
http://www.securityfocus.com/archive/1/432357/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/432579/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/433258/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/433352/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/433693/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/434011/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/434234/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/434279/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/436639/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/440303/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/14759 cve-icon cve-icon
http://www.securityfocus.com/bid/19884 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1565 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1577 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1611 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1681 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1694 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1725 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1775 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1797 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1835 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1836 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2047 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2184 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2824 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3495 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26116 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26142 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26168 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26272 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26302 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26315 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26385 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26447 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26479 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26480 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26736 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26982 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27763 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/28787 cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2005-09-08T04:00:00

Updated: 2024-08-07T22:53:28.858Z

Reserved: 2005-09-08T00:00:00

Link: CVE-2005-2856

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2005-09-08T10:03:00.000

Modified: 2024-11-21T00:00:34.690

Link: CVE-2005-2856

cve-icon Redhat

No data.