Buffer overflow in Arcext.dll 2.16.1 and earlier in pon software Explzh 5.62 and earlier allows remote attackers to execute arbitrary code via an LZH LHA file with a crafted header that is not properly handled during expansion.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 01:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://jvn.jp/en/jp/JVN34729123/index.html - Third Party Advisory, Vendor Advisory | |
| References | () http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000026.html - Third Party Advisory, VDB Entry | |
| References | () http://osvdb.org/65666 - Broken Link | |
| References | () http://secunia.com/advisories/40324 - Third Party Advisory, Vendor Advisory | |
| References | () http://www.ponsoftware.com/archiver/bug.htm#lzh_bufover - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/41025 - Third Party Advisory, VDB Entry | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/59624 - Third Party Advisory, VDB Entry | 
Information
                Published : 2010-06-25 18:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-2434
Mitre link : CVE-2010-2434
CVE.ORG link : CVE-2010-2434
JSON object : View
Products Affected
                ponsoftware
- explzh
 
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
