Vulnerability Name:

CVE-2004-0947 (CCN-18044)

Assigned:2004-11-11
Published:2004-11-11
Updated:2017-07-11
Summary:Buffer overflow in unarj before 2.63a-r2 allows remote attackers to execute arbitrary code via an arj archive that contains long filenames.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-0947

Source: FEDORA
Type: UNKNOWN
FLSA:2272

Source: CCN
Type: RHSA-2005-007
unarj security update

Source: CCN
Type: ARJ Software Web site
ARJ Software

Source: DEBIAN
Type: UNKNOWN
DSA-652

Source: DEBIAN
Type: DSA-652
unarj -- several vulnerabilities

Source: CCN
Type: GLSA-200411-29
unarj: Long filenames buffer overflow and a path traversal vulnerability

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200411-29

Source: REDHAT
Type: UNKNOWN
RHSA-2005:007

Source: BID
Type: Patch, Vendor Advisory
11665

Source: CCN
Type: BID-11665
ARJ Software UNARJ Remote Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
unarj-longfilename-bo(18044)

Source: XF
Type: UNKNOWN
unarj-longfilename-bo(18044)

Source: SUSE
Type: SUSE-SR:2004:003
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:arj_software_inc.:unarj:2.62:*:*:*:*:*:*:*
  • OR cpe:/a:arj_software_inc.:unarj:2.63_a:*:*:*:*:*:*:*
  • OR cpe:/a:arj_software_inc.:unarj:2.64:*:*:*:*:*:*:*
  • OR cpe:/a:arj_software_inc.:unarj:2.65:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20040947
    V
    CVE-2004-0947
    2015-11-16
    oval:org.debian:def:652
    V
    several vulnerabilities
    2005-01-21
    BACK
    arj_software_inc. unarj 2.62
    arj_software_inc. unarj 2.63_a
    arj_software_inc. unarj 2.64
    arj_software_inc. unarj 2.65
    gentoo linux *
    suse suse linux 9.0
    suse suse linux 9.1
    suse suse linux 9.2