Secunia Security Advisory - A vulnerability has been reported in PowerArchiver, which potentially can be exploited by malicious people to compromise a user's system.
52b70bc9282b00fc669d9e48a3cf188a95f4bf9b22c0381697c61d4a1da5b900
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
https://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
PowerArchiver "BlackHole" Archive Handling Buffer Overflow
SECUNIA ADVISORY ID:
SA27000
VERIFY ADVISORY:
https://secunia.com/advisories/27000/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
REVISION:
2.0 originally posted 2007-10-05
SOFTWARE:
PowerArchiver 2007 10.x
https://secunia.com/product/15071/
PowerArchiver 2000 5.x
https://secunia.com/product/7501/
PowerArchiver 2001 6.x
https://secunia.com/product/7500/
PowerArchiver 2001 7.x
https://secunia.com/product/10025/
PowerArchiver 2002 8.x
https://secunia.com/product/2201/
PowerArchiver 2003 8.x
https://secunia.com/product/2202/
PowerArchiver 2004 9.x
https://secunia.com/product/5756/
PowerArchiver 2006 9.x
https://secunia.com/product/7912/
DESCRIPTION:
A vulnerability has been reported in PowerArchiver, which potentially
can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error when handling
"BlackHole" archives. This can be exploited to cause a heap-based
buffer overflow via a specially crafted "BlackHole" archive
containing an overly long filename.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in versions prior to 10.20.21.
SOLUTION:
Update to version 10.20.21.
https://www.powerarchiver.com/download/
PROVIDED AND/OR DISCOVERED BY:
Fourteenforty Research Institute, Inc.
CHANGELOG:
2007-10-05: Updated the credits and the "Description" section with
additional information. Added additional affected versions.
ORIGINAL ADVISORY:
Fourteenforty Research Institute, Inc.:
https://www.fourteenforty.jp/research/advisory.cgi?FFRRA-20071009
PowerArchiver:
https://www.powerarchiver.com/news/
JVN:
https://jvn.jp/jp/JVN%2361323184/index.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------