DescriptionMultiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
Overall state of this security issue: Resolved
This issue is currently rated as having critical severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SuSE-SA:2004:010, published Tuesday, May 5th 2004 02:30 MEST
- SuSE-SA:2004:011, published Thursday, May 6th 2004 22:30 MEST
SUSE Timeline for this CVECVE page created: Fri Jun 28 00:46:37 2013
CVE page last modified: Fri Oct 7 12:45:28 2022