[NT] PowerArchiver DZIPS32.DLL Buffer Overflow
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 27 Jul 2006 14:08:29 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
PowerArchiver DZIPS32.DLL Buffer Overflow
<http://www.powerarchiver.com/pacl/> PACL is "an advanced command line
archiving utility for Windows console environments. It fully supports a
variety of the most popular compressed file formats, including: ZIP, CAB,
JAR, TAR, TAR.GZ, TAR.BZ2, yENC, Base64, CAB SFX and many others. PACL
also includes 5 different encryption methods". A vulnerability has been
found in PowerArchiver. When exploited, the vulnerability allows execution
of arbitrary code when the user adds a file to a malicious ZIP archive.
* PowerArchiver version 9.62.03
* PowerArchiver version 9.63
This advisory discloses a buffer overflow vulnerability in PowerArchiver.
The stack-based buffer overflow occurs when PowerArchiver is attempting to
add a file to a ZIP archive that contains a file with an overly long
filename. It is possible to exploit the buffer overflow to execute
In order to exploit this vulnerability successfully, the user must be
convinced to open a malicious ZIP archive and to add a file to the
The buffer overflow occurs in DZIPS32.DLL (version 188.8.131.52) that is
distributed with PowerArchiver.
The buffer overflow occurs in a function that resembles the following in
func_20009B20(arg_0, arg_4, arg_8)
char buffer[0x800]; // 2048 bytes
var1 = 0;
var2 = 0;
var3 = 0;
var9 = 0;
var11 = 0;
// Both cases will cause buffer overflow in "buffer"
// when filename of compressed file is > 2048 bytes
if(arg_8->someFlag == 0)
2006-07-08 - Vulnerability Discovered.
2006-07-17 - Initial Vendor Notification.
2006-07-25 - Vendor Released Fixed Version.
2006-07-25 - Public Release.
The information has been provided by <mailto:chewkeong@xxxxxxx> Tan Chew
The original article can be found at: <http://vuln.sg/powarc962-en.html>
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NEWS] VMware Possible Incorrect Permissions on SSL Key Files
- Next by Date: [NT] FileCOPA Directory Argument Handling Buffer
- Previous by thread: [NEWS] VMware Possible Incorrect Permissions on SSL Key Files
- Next by thread: [NT] FileCOPA Directory Argument Handling Buffer