{"vuid":"VU#116182","idnumber":"116182","name":"WinZip vulnerable to buffer overflow in handling of MIME archive parameters","keywords":["WinZip","buffer overflow","MIME parsing","UUDeview"],"overview":"A buffer overflow vulnerability in the WinZip program could allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"WinZip Computing, Inc.'s WinZip is a popular utility for creating and extracting a variety of archive file formats on Microsoft Windows-based systems. A buffer overflow error exists in the way that WinZip handles certain parameters of MIME archives. This error results in a vulnerability when WinZip attempts to interpret invalid data in a MIME-encoded file. An attacker could exploit this vulnerability by introducing a specially-crafted file to be opened by WinZip, and then coaxing or tricking a user or application into opening it. The malicious file could be introduced in a number of ways including, but not limited to, a remote web page, an email attachment, peer-to-peer file sharing, or network filesystems.","impact":"An attacker could execute arbitrary code of their choice on a vulnerable system.","resolution":"Upgrade to the latest version of the software WinZip Computing, Inc. has released an updated version of the WinZip software that includes a fix for this vulnerability. Users are strongly encouraged to upgrade to this version of the software. More details can be found in the Systems Affected section of this document.","workarounds":"","sysaffected":"","thanks":"Thanks to iDefense Security Advisory for reporting this vulnerability.","author":"This document was written by Chad R Dougherty based on information provided by iDefense and WinZip","public":["http://www.winzip.com","http://www.idefense.com/application/poi/display?id=76&type=vulnerabilitiies"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-02-27T16:53:27Z","publicdate":"2004-02-27T00:00:00Z","datefirstpublished":"2004-03-01T14:56:23Z","dateupdated":"2004-03-01T15:50:02Z","revision":13,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"19","cam_easeofexploitation":"8","cam_attackeraccessrequired":"15","cam_scorecurrent":"7.695","cam_scorecurrentwidelyknown":"9.8325","cam_scorecurrentwidelyknownexploited":"18.3825","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.695,"vulnote":null}