CVE-2004-0234 (CNNVD-200408-202)

CRITICAL
中文标题:
LHA缓冲区溢出/目录遍历漏洞
英文标题:
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used i...
CVSS分数: 10.0
发布时间: 2004-05-05 04:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

LHa是一款基于控制台的解压缩程序。 LHa存在两个缓冲区溢出和两个目录遍历问题,远程攻击者可以利用这些漏洞以进程权限在系统上执行任意指令或破坏系统。 缓冲区溢出发生在测试(t)或者展开(x)操作时,对超长文件名或目录名进行解析时,get_header()函数会发生缓冲区溢出。精心构建文件名或目录名可以进程权限执行任意指令。 另外就是对相对路径没有任何保护,可简单使用LHA建立路径类似"../../../../../etc/cron.d/evil"的压缩包,虽然对绝对路径有保护,但可使用类似"//etc/cron.d/evil"的路径形式绕过。攻击者可以构建简单包当LHA操作时破坏系统文件。

英文描述:

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

CWE类型:
CWE-119
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
clearswift mailsweeper 4.0 - - cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*
clearswift mailsweeper 4.1 - - cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*
clearswift mailsweeper 4.2 - - cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*
clearswift mailsweeper 4.3 - - cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.3 - - cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.4 - - cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.5 - - cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.6 - - cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.6_sp1 - - cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.7 - - cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.8 - - cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.10 - - cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.11 - - cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*
clearswift mailsweeper 4.3.13 - - cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*
f-secure f-secure_anti-virus 4.51 - - cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*
f-secure f-secure_anti-virus 4.52 - - cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*
f-secure f-secure_anti-virus 4.60 - - cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*
f-secure f-secure_anti-virus 5.5 - - cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*
f-secure f-secure_anti-virus 5.41 - - cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*
f-secure f-secure_anti-virus 5.42 - - cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*
f-secure f-secure_anti-virus 5.52 - - cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*
f-secure f-secure_anti-virus 6.21 - - cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*
f-secure f-secure_anti-virus 2003 - - cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*
f-secure f-secure_anti-virus 2004 - - cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*
f-secure f-secure_for_firewalls 6.20 - - cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*
f-secure f-secure_internet_security 2003 - - cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*
f-secure f-secure_internet_security 2004 - - cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*
f-secure f-secure_personal_express 4.5 - - cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*
f-secure f-secure_personal_express 4.6 - - cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*
f-secure f-secure_personal_express 4.7 - - cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*
f-secure internet_gatekeeper 6.31 - - cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*
f-secure internet_gatekeeper 6.32 - - cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*
rarlab winrar 3.20 - - cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*
redhat lha 1.14i-9 - - cpe:2.3:a:redhat:lha:1.14i-9:*:i386:*:*:*:*:*
sgi propack 2.4 - - cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*
sgi propack 3.0 - - cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
stalker cgpmcafee 3.2 - - cpe:2.3:a:stalker:cgpmcafee:3.2:*:*:*:*:*:*:*
tsugio_okamoto lha 1.14 - - cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*
tsugio_okamoto lha 1.15 - - cpe:2.3:a:tsugio_okamoto:lha:1.15:*:*:*:*:*:*:*
tsugio_okamoto lha 1.17 - - cpe:2.3:a:tsugio_okamoto:lha:1.17:*:*:*:*:*:*:*
winzip winzip 9.0 - - cpe:2.3:a:winzip:winzip:9.0:*:*:*:*:*:*:*
redhat fedora_core core_1.0 - - cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1015866 vdb-entry
cve.org
访问
CLA-2004:840 vendor-advisory
cve.org
访问
5753 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:977 vdb-entry
cve.org
访问
FEDORA-2004-119 vendor-advisory
cve.org
访问
20060403 Barracuda LHA archiver security bug leads to remote compromise mailing-list
cve.org
访问
10243 vdb-entry
cve.org
访问
ADV-2006-1220 vdb-entry
cve.org
访问
20040501 LHa buffer overflows and directory traversal problems mailing-list
cve.org
访问
19514 third-party-advisory
cve.org
访问
5754 vdb-entry
cve.org
访问
RHSA-2004:179 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
FLSA:1833 vendor-advisory
cve.org
访问
DSA-515 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:9881 vdb-entry
cve.org
访问
20040510 [Ulf Harnhammar]: LHA Advisory + Patch mailing-list
cve.org
访问
GLSA-200405-02 vendor-advisory
cve.org
访问
RHSA-2004:178 vendor-advisory
cve.org
访问
lha-multiple-bo(16012) vdb-entry
cve.org
访问
20040502 Lha local stack overflow Proof Of Concept Code mailing-list
cve.org
访问
CVSS评分详情
10.0
CRITICAL
CVSS向量: AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2004-05-05 04:00:00
修改时间:
2024-08-08 00:10:03
创建时间:
2025-11-11 15:32:20
更新时间:
2025-11-11 15:48:54
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2004-0234 2025-11-11 15:17:28 2025-11-11 07:32:20
NVD nvd_CVE-2004-0234 2025-11-11 14:50:55 2025-11-11 07:41:07
CNNVD cnnvd_CNNVD-200408-202 2025-11-11 15:08:44 2025-11-11 07:48:54
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:54
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200408-202; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200408-202
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:07
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 10.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 42; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 10.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 42
  • data_sources: ['cve'] -> ['cve', 'nvd']