CVE-2004-1094
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
10/01/2005
Última modificación:
03/04/2025
Descripción
Desbordamiento de búfer en el archivo InnerMedia DynaZip DUNZIP32.dll versión 5.00.03 y anteriores permite a atacantes ejecutar código de su elección mediante un fichero ZIP con un nombre de fichero largo, como se a demostrado usando (1) un fichero .rjs (piel) en RealPlayer 10 a 10.5 (6.0.12.1053) y RealOne Player 1 y 2, (2) la función función Restore Backup en CheckMark Software Payroll 2004/2005 3.9.6 y anteriores, (3) CheckMark MultiLedger anetrior a 7.0.2, (4) dtSearch 6.x y 7.x, (5) mcupdmgr.exe y mghtml.exe en McAfee VirusScan 10 construcción 10.0.21 y anteriores, y otros productos. NOTA: No está claro si esta es la misma vulnerabilidad que CVE-2004-0575, aunque la manipulación de datos es la misma.<br />
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:checkmark:checkmark_payroll:*:*:*:*:*:*:*:* | 3.9.6 (incluyendo) | |
| cpe:2.3:a:checkmark:checkmark_payroll:3.7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:checkmark_payroll:3.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:checkmark_payroll:3.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:checkmark_payroll:3.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:checkmark_payroll:3.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:checkmark_payroll:3.9.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:multiledger:*:*:*:*:*:*:*:* | 7.0.1 (incluyendo) | |
| cpe:2.3:a:checkmark:multiledger:6.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:multiledger:6.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:checkmark:multiledger:7.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:innermedia:dynazip_library:5.00.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:innermedia:dynazip_library:5.00.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:innermedia:dynazip_library:5.00.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:innermedia:dynazip_library:5.00.03:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html
- http://marc.info/?l=bugtraq&m=109894226007607&w=2
- http://secunia.com/advisories/17096
- http://secunia.com/advisories/17394
- http://secunia.com/advisories/18194
- http://secunia.com/advisories/19451
- http://securityreason.com/securityalert/296
- http://securityreason.com/securityalert/653
- http://securitytracker.com/id?1011944=
- http://securitytracker.com/id?1012297=
- http://securitytracker.com/id?1016817=
- http://service.real.com/help/faq/security/041026_player/EN/
- http://www.kb.cert.org/vuls/id/582498
- http://www.networksecurity.fi/advisories/dtsearch.html
- http://www.networksecurity.fi/advisories/lotus-notes.html
- http://www.networksecurity.fi/advisories/mcafee-virusscan.html
- http://www.networksecurity.fi/advisories/multiledger.html
- http://www.networksecurity.fi/advisories/payroll.html
- http://www.osvdb.org/19906
- http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html
- http://www.securityfocus.com/archive/1/420274/100/0/threaded
- http://www.securityfocus.com/archive/1/429361/100/0/threaded
- http://www.securityfocus.com/archive/1/445369/100/0/threaded
- http://www.securityfocus.com/bid/11555
- http://www.vupen.com/english/advisories/2005/2057
- http://www.vupen.com/english/advisories/2006/1176
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17879
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22737
- http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html
- http://marc.info/?l=bugtraq&m=109894226007607&w=2
- http://secunia.com/advisories/17096
- http://secunia.com/advisories/17394
- http://secunia.com/advisories/18194
- http://secunia.com/advisories/19451
- http://securityreason.com/securityalert/296
- http://securityreason.com/securityalert/653
- http://securitytracker.com/id?1011944=
- http://securitytracker.com/id?1012297=
- http://securitytracker.com/id?1016817=
- http://service.real.com/help/faq/security/041026_player/EN/
- http://www.kb.cert.org/vuls/id/582498
- http://www.networksecurity.fi/advisories/dtsearch.html
- http://www.networksecurity.fi/advisories/lotus-notes.html
- http://www.networksecurity.fi/advisories/mcafee-virusscan.html
- http://www.networksecurity.fi/advisories/multiledger.html
- http://www.networksecurity.fi/advisories/payroll.html
- http://www.osvdb.org/19906
- http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html
- http://www.securityfocus.com/archive/1/420274/100/0/threaded
- http://www.securityfocus.com/archive/1/429361/100/0/threaded
- http://www.securityfocus.com/archive/1/445369/100/0/threaded
- http://www.securityfocus.com/bid/11555
- http://www.vupen.com/english/advisories/2005/2057
- http://www.vupen.com/english/advisories/2006/1176
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17879
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22737



