Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMB:EXT:DOT-ZIP

Severity

Low

Recommended

No

Category

SMB

Release Date

2004/09/15

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMB: ZIP File Connection Request


This signature detects a request by a client to open a remote zip file over the SMB protocol. Requests for zip files over the LAN are likely to be legitimate, but could be an attack attempt when a client is connecting to a server on the internet. A remote server could trick a client into requesting a malformed zip file to exploit vulnerabilities in zip file parsers.

Extended Description

WinZip is reported prone to multiple unspecified buffer overflow vulnerabilities. These issues may allow a remote or local attacker to potentially execute arbitrary code on a vulnerable computer. A successful attack may allow an attacker to gain unauthorized access to a computer. The problems likely occur due to insufficient bounds checking when processing zip archives. A local buffer overflow vulnerability was reported as well. This issue can be triggered through the command line. WinZip versions 9.0 and prior are affected by these issues. Due to a lack of details, further information is not available at the moment. This BID will be updated as more information becomes available.

Affected Products

  • WinZip 7.0.0
  • WinZip 8.0.0
  • WinZip 8.1.0
  • WinZip 8.1.0 SR-1
  • WinZip 9.0.0

References

  • BugTraq: 11092
  • CVE: CVE-2004-1465
  • URL: http://www.ciac.org/ciac/bulletins/o-211.shtml
  • URL: http://www.securityfocus.com/bid/11092

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out