Lucene search

K
cve[email protected]CVE-2004-0234
HistoryAug 18, 2004 - 4:00 a.m.

CVE-2004-0234

2004-08-1804:00:00
CWE-119
web.nvd.nist.gov
43
cve
2004
0234
stack-based buffer overflow
lha 1.14
barracuda spam firewall
nvd
security
vulnerability

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

Low

0.934 High

EPSS

Percentile

99.1%

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

Affected configurations

NVD
Node
clearswiftmailsweeperMatch4.0
OR
clearswiftmailsweeperMatch4.1
OR
clearswiftmailsweeperMatch4.2
OR
clearswiftmailsweeperMatch4.3
OR
clearswiftmailsweeperMatch4.3.3
OR
clearswiftmailsweeperMatch4.3.4
OR
clearswiftmailsweeperMatch4.3.5
OR
clearswiftmailsweeperMatch4.3.6
OR
clearswiftmailsweeperMatch4.3.6_sp1
OR
clearswiftmailsweeperMatch4.3.7
OR
clearswiftmailsweeperMatch4.3.8
OR
clearswiftmailsweeperMatch4.3.10
OR
clearswiftmailsweeperMatch4.3.11
OR
clearswiftmailsweeperMatch4.3.13
OR
f-securef-secure_anti-virusMatch4.51linux_gateways
OR
f-securef-secure_anti-virusMatch4.51linux_servers
OR
f-securef-secure_anti-virusMatch4.51linux_workstations
OR
f-securef-secure_anti-virusMatch4.52linux_gateways
OR
f-securef-secure_anti-virusMatch4.52linux_servers
OR
f-securef-secure_anti-virusMatch4.52linux_workstations
OR
f-securef-secure_anti-virusMatch4.60samba_servers
OR
f-securef-secure_anti-virusMatch5.5client_security
OR
f-securef-secure_anti-virusMatch5.41mimesweeper
OR
f-securef-secure_anti-virusMatch5.41windows_servers
OR
f-securef-secure_anti-virusMatch5.41workstations
OR
f-securef-secure_anti-virusMatch5.42mimesweeper
OR
f-securef-secure_anti-virusMatch5.42windows_servers
OR
f-securef-secure_anti-virusMatch5.42workstations
OR
f-securef-secure_anti-virusMatch5.52client_security
OR
f-securef-secure_anti-virusMatch6.21ms_exchange
OR
f-securef-secure_anti-virusMatch2003
OR
f-securef-secure_anti-virusMatch2004
OR
f-securef-secure_for_firewallsMatch6.20
OR
f-securef-secure_internet_securityMatch2003
OR
f-securef-secure_internet_securityMatch2004
OR
f-securef-secure_personal_expressMatch4.5
OR
f-securef-secure_personal_expressMatch4.6
OR
f-securef-secure_personal_expressMatch4.7
OR
f-secureinternet_gatekeeperMatch6.31
OR
f-secureinternet_gatekeeperMatch6.32
OR
rarlabwinrarMatch3.20
OR
redhatlhaMatch1.14i-9i386
OR
sgipropackMatch2.4
OR
sgipropackMatch3.0
OR
stalkercgpmcafeeMatch3.2
OR
tsugio_okamotolhaMatch1.14
OR
tsugio_okamotolhaMatch1.15
OR
tsugio_okamotolhaMatch1.17
OR
winzipwinzipMatch9.0
Node
redhatfedora_coreMatchcore_1.0

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

Low

0.934 High

EPSS

Percentile

99.1%