Vulnerability Details : CVE-2005-3317
Multiple stack-based buffer overflows in ZipGenius 5.5.1.468 and 6.0.2.1041, and other versions before 6.0.2.1050, allow remote attackers to execute arbitrary code via (1) a ZIP archive that contains a file with a long filename, which is not properly handled by (a) zipgenius.exe, (b) zg.exe, (c) zgtips.dll, and (d) contmenu.dll; (2) a long original name in a (a) UUE, (b) XXE, or (c) MIM file, which is not properly handled by zipgenius.exe; or (3) an ACE archive with a file with a long filename, which is not properly handled by unacev2.dll.
Vulnerability category: OverflowXML external entity (XXE) injectionExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-3317
Probability of exploitation activity in the next 30 days: 18.62%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3317
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2005-3317
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-3317
Products affected by CVE-2005-3317
- cpe:2.3:a:zipgenius:zipgenius:*:*:*:*:*:*:*:*
- cpe:2.3:a:zipgenius:zipgenius:*:*:*:*:*:*:*:*
- cpe:2.3:a:zipgenius:zipgenius:standard_5.5.1.468:*:*:*:*:*:*:*
- cpe:2.3:a:zipgenius:zipgenius:suite_5.5.1.468:*:*:*:*:*:*:*