Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:WIN-MAL-COMP-FILE

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Windows Compressed Folder File Exploit

Release Date

2004/11/03

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Windows Compressed Folder File Exploit


This signature detects attempts to exploit a known vulnerability in Microsoft Windows native compressed file handler. Attackers can send .zip files with overly long filenames to overflow the file handler and run arbitrary code.

Extended Description

Microsoft Windows contains a buffer overflow in the Compressed (zipped) Folders feature. A maliciously crafted compressed file could overrun an internal buffer causing arbitrary code to be executed in the security context of the current user.

Affected Products

  • Avaya DefinityOne Media Servers
  • Avaya IP600 Media Servers
  • Avaya Modular Messaging (MSS) 1.1.0
  • Avaya Modular Messaging (MSS) 2.0.0
  • Avaya S3400 Message Application Server
  • Avaya S8100 Media Servers
  • Microsoft Windows Server 2003 Datacenter Edition
  • Microsoft Windows Server 2003 Datacenter Edition Itanium
  • Microsoft Windows Server 2003 Enterprise Edition
  • Microsoft Windows Server 2003 Enterprise Edition Itanium
  • Microsoft Windows Server 2003 Standard Edition
  • Microsoft Windows Server 2003 Web Edition
  • Microsoft Windows XP 64-bit Edition SP1
  • Microsoft Windows XP 64-bit Edition
  • Microsoft Windows XP 64-bit Edition Version 2003 SP1
  • Microsoft Windows XP 64-bit Edition Version 2003
  • Microsoft Windows XP Home SP1
  • Microsoft Windows XP Home
  • Microsoft Windows XP Media Center Edition SP1
  • Microsoft Windows XP Media Center Edition
  • Microsoft Windows XP Professional SP1
  • Microsoft Windows XP Professional
  • Microsoft Windows XP Tablet PC Edition
  • Real Networks RealOne Player 1.0.0
  • Real Networks RealOne Player 2.0.0
  • Real Networks RealPlayer 10.0.0
  • Real Networks RealPlayer 10.5.0 Beta v6.0.12.1016
  • Real Networks RealPlayer 10.5.0 V6.0.12.1040
  • Real Networks RealPlayer 10.5.0 V6.0.12.1053

References

  • BugTraq: 11382
  • CVE: CVE-2004-0575
  • URL: http://www.microsoft.com/technet/security/bulletin/ms04-034.mspx
  • URL: http://www.kb.cert.org/vuls/id/649374

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out