|
Vulnerability zipandemail Affected Winzip 8.0 for Windows NT/2000 Description Following is based on a Defcom Labs Advisory def-2001-09 by Peter Grundl. Winzip contains an exploitable buffer overflow flaw that could allow an attacker to execute arbitrary code under the user context of the user or service running winzip. The /zipandemail option in winzip contains a buffer overflow flaw when handling very long filenames. The EIP is overwritten and a carefully crafted filename could allow for execution of arbitrary code. The probability of this happening "in the wild" is very low, as the overflow only triggers if winzip is used with this option. Theoretically, this could occur when a .jpg with a malformed filename is 'zipped and emailed'. Alternatively if an attacker managed to place a malicious file in the log directory on an automated logging system´ then the automated zipping and emailing of the log would trigger the overflow. Solution Don't use the /zipandemail function indescrimantely before a fix has been released. The Vendor was contacted December 18th, 2000 and replied: "Hopefully this will be corrected in the next version, fortunately this doesn't seem to a problem that many people will run into."