Short Name |
SMB:EXT:DOT-ZIP |
---|---|
Severity |
Low |
Recommended |
No |
Category |
SMB |
Release Date |
2004/09/15 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects a request by a client to open a remote zip file over the SMB protocol. Requests for zip files over the LAN are likely to be legitimate, but could be an attack attempt when a client is connecting to a server on the internet. A remote server could trick a client into requesting a malformed zip file to exploit vulnerabilities in zip file parsers.
WinZip is reported prone to multiple unspecified buffer overflow vulnerabilities. These issues may allow a remote or local attacker to potentially execute arbitrary code on a vulnerable computer. A successful attack may allow an attacker to gain unauthorized access to a computer. The problems likely occur due to insufficient bounds checking when processing zip archives. A local buffer overflow vulnerability was reported as well. This issue can be triggered through the command line. WinZip versions 9.0 and prior are affected by these issues. Due to a lack of details, further information is not available at the moment. This BID will be updated as more information becomes available.