search menu icon-carat-right cmu-wordmark

CERT Coordination Center

unace buffer overflow vulnerability

Vulnerability Note VU#215006

Original Release Date: 2005-09-21 | Last Revised: 2005-10-28

Overview

A buffer overflow in the unace compression library may allow a remote attacker to execute arbitrary code.

Description

The unace compression library is used to decompress ace archives (*.ace file extension). A lack of input validation on filenames in an ace archive may allow a buffer overflow to occur. If an attacker supplies the unace library with a specially crafted compressed ace archive, that attacker may be able to trigger the buffer overflow and, consequently, execute arbitrary code with the privileges of the application linked to unace.

Impact

If a remote attacker can convince a user to access a specially crafted ace archive, that attacker may be able to execute arbitrary code. In addition, this vulnerability may prevent security software, such as anti-virus software, from detecting a malicious ace archive.

Solution

Apply patches from your vendor

The unace compression library is freely available and used by many vendors in a wide variety of applications. As a result, any one of these applications may contain this vulnerability. Users are encouraged to contact their vendors to determine if they are vulnerable and what action to take.

Do not accept ace archives from untrusted sources

Exploitation occurs by accessing a specially crafted ace archive. By only accessing ace archives from trusted or known sources, the chances of exploitation are reduced.

Vendor Information

215006
 

View all 57 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Ulf Harnhammar.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-0160
Severity Metric: 4.50
Date Public: 2005-02-22
Date First Published: 2005-09-21
Date Last Updated: 2005-10-28 18:05 UTC
Document Revision: 59

Sponsored by CISA.