Vulnerability Name: CVE-2004-1094 (CCN-17879) Assigned: 2004-10-27 Published: 2004-10-27 Updated: 2018-10-19 Summary: Buffer overflow in InnerMedia DynaZip DUNZIP32.dll file version 5.00.03 and earlier allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, as demonstrated using (1) a .rjs (skin) file in RealPlayer 10 through RealPlayer 10.5 (6.0.12.1053), RealOne Player 1 and 2, (2) the Restore Backup function in CheckMark Software Payroll 2004/2005 3.9.6 and earlier, (3) CheckMark MultiLedger before 7.0.2, (4) dtSearch 6.x and 7.x, (5) mcupdmgr.exe and mghtml.exe in McAfee VirusScan 10 Build 10.0.21 and earlier, (6) IBM Lotus Notes before 6.5.5, and other products. Note : it is unclear whether this is the same vulnerability as CVE-2004-0575 , although the data manipulations are the same. CVSS v3 Severity: 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Wed Oct 27 2004 - 01:43:04 CDTHigh Risk Vulnerability in RealPlayer Source: CCN Type: BugTraq Mailing List, Thu Mar 30 2006 - 06:59:03 CSTMcAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability Source: BUGTRAQ Type: UNKNOWN20041027 EEYE: RealPlayer Zipped Skin File Buffer Overflow Source: CCN Type: Full-Disclosure Mailing List, Wed Oct 27 2004 - 15:40:22 CDTEEYE: RealPlayer Zipped Skin File Buffer Overflow Source: CCN Type: Full-Disclosure Mailing List, Wed Sep 06 2006 - 14:42:41 CDTIBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability Source: MITRE Type: CNACVE-2004-1094 Source: BUGTRAQ Type: UNKNOWN20041027 High Risk Vulnerability in RealPlayer Source: CCN Type: SA17096CheckMark Payroll DUNZIP32.dll Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory17096 Source: CCN Type: SA17394CheckMark MultiLedger DUNZIP32.dll Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory17394 Source: CCN Type: SA18194dtSearch DUNZIP32.dll Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory18194 Source: CCN Type: SA19451McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN19451 Source: SREASON Type: UNKNOWN296 Source: SREASON Type: UNKNOWN653 Source: CCN Type: SECTRACK ID: 1011944RealPlayer Skin File Buffer Overflow May Let Remote Users Run Arbitrary Code Source: SECTRACK Type: UNKNOWN1011944 Source: CCN Type: SECTRACK ID: 1012297DynaZip Buffer Overflow in Processing Long Filenames May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1012297 Source: CCN Type: SECTRACK ID: 1016817IBM Lotus Notes Buffer Overflow in `DUNZIP32.dll` Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1016817 Source: CONFIRM Type: UNKNOWNhttp://service.real.com/help/faq/security/041026_player/EN/ Source: CCN Type: IBM Lotus Notes Web pageIBM Software - IBM Lotus Notes home page Source: CCN Type: CheckMark Software, Inc. Web siteCheckMark Software, Inc. - Payroll for Windows and Macintosh Source: CCN Type: CIAC Information Bulletin P-023RealPlayer Vulnerability Source: CCN Type: GetRight Web siteGetRight Download Manager: Resume Downloads, Schedule Downloads, Faster Downloads Source: CCN Type: Headlight Software, Inc. Web siteChanges in GetRight 5.2x: Source: CCN Type: US-CERT VU#582498InnerMedia DynaZip library vulnerable to buffer overflow via long file names Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#582498 Source: CCN Type: Networksecurity.fi Security Advisory (21-12-2005)dtSearch DUNZIP32.dll buffer overflow vulnerability Source: MISC Type: Vendor Advisoryhttp://www.networksecurity.fi/advisories/dtsearch.html Source: MISC Type: UNKNOWNhttp://www.networksecurity.fi/advisories/lotus-notes.html Source: MISC Type: UNKNOWNhttp://www.networksecurity.fi/advisories/mcafee-virusscan.html Source: CCN Type: Networksecurity.fi Security Advisory (28-10-2005)CheckMark MultiLedger DUNZIP32.dll buffer overflow vulnerability Source: MISC Type: UNKNOWNhttp://www.networksecurity.fi/advisories/multiledger.html Source: CCN Type: Networksecurity.fi Security Advisory (10-10-2005)CheckMark Payroll DUNZIP32.dll buffer overflow vulnerability Source: MISC Type: UNKNOWNhttp://www.networksecurity.fi/advisories/payroll.html Source: OSVDB Type: UNKNOWN19906 Source: CCN Type: OSVDB ID: 19906InnerMedia DynaZip DUNZIP32.dll Filename Overflow Source: MISC Type: UNKNOWNhttp://www.securiteam.com/windowsntfocus/6Z00W00EAM.html Source: BUGTRAQ Type: UNKNOWN20051223 dtSearch DUNZIP32.dll Buffer Overflow Vulnerability Source: BUGTRAQ Type: UNKNOWN20060330 McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability Source: BUGTRAQ Type: UNKNOWN20060906 IBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability Source: BID Type: Vendor Advisory11555 Source: CCN Type: BID-11555InnerMedia DynaZip Remote Stack Based Buffer Overflow Vulnerability Source: CCN Type: BID-11836Headlight Software GetRight DUNZIP32.dll Remote Buffer Overflow Vulnerability Source: CCN Type: RealNetworks, Inc. Releases Update October 26, 2004RealNetworks, Inc. Releases Update to Address Security Vulnerabilities. Source: VUPEN Type: UNKNOWNADV-2005-2057 Source: VUPEN Type: UNKNOWNADV-2006-1176 Source: XF Type: UNKNOWNdynazip-dunzip32-bo(17879) Source: XF Type: UNKNOWNrealplayer-dunzip32-bo(17879) Source: XF Type: UNKNOWNpayroll-dunzip32-bo(22737) Vulnerable Configuration: Configuration 1 :cpe:/a:checkmark:checkmark_payroll:3.7.5:*:*:*:*:*:*:* OR cpe:/a:checkmark:checkmark_payroll:3.9.1:*:*:*:*:*:*:* OR cpe:/a:checkmark:checkmark_payroll:3.9.2:*:*:*:*:*:*:* OR cpe:/a:checkmark:checkmark_payroll:3.9.3:*:*:*:*:*:*:* OR cpe:/a:checkmark:checkmark_payroll:3.9.4:*:*:*:*:*:*:* OR cpe:/a:checkmark:checkmark_payroll:3.9.5:*:*:*:*:*:*:* OR cpe:/a:checkmark:checkmark_payroll:*:*:*:*:*:*:*:* (Version <= 3.9.6) OR cpe:/a:checkmark:multiledger:6.0.3:*:*:*:*:*:*:* OR cpe:/a:checkmark:multiledger:6.0.5:*:*:*:*:*:*:* OR cpe:/a:checkmark:multiledger:7.0.0:*:*:*:*:*:*:* OR cpe:/a:checkmark:multiledger:*:*:*:*:*:*:*:* (Version <= 7.0.1) OR cpe:/a:innermedia:dynazip_library:5.00.00:*:*:*:*:*:*:* OR cpe:/a:innermedia:dynazip_library:5.00.01:*:*:*:*:*:*:* OR cpe:/a:innermedia:dynazip_library:5.00.02:*:*:*:*:*:*:* OR cpe:/a:innermedia:dynazip_library:5.00.03:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realone_player:1.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realone_player:2.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:* OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:mcafee:virusscan:*:*:*:*:*:*:*:* AND cpe:/a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
checkmark checkmark payroll 3.7.5
checkmark checkmark payroll 3.9.1
checkmark checkmark payroll 3.9.2
checkmark checkmark payroll 3.9.3
checkmark checkmark payroll 3.9.4
checkmark checkmark payroll 3.9.5
checkmark checkmark payroll *
checkmark multiledger 6.0.3
checkmark multiledger 6.0.5
checkmark multiledger 7.0.0
checkmark multiledger *
innermedia dynazip library 5.00.00
innermedia dynazip library 5.00.01
innermedia dynazip library 5.00.02
innermedia dynazip library 5.00.03
realnetworks realone player 1.0
realnetworks realone player 2.0
realnetworks realplayer 10.0
realnetworks realplayer 10.0_6.0.12.690
realnetworks realplayer 10.0_beta
realnetworks realplayer 10.5
realnetworks realplayer 10.5_6.0.12.1016_beta
realnetworks realplayer 10.5_6.0.12.1040
realnetworks realplayer 10.5_6.0.12.1053
mcafee virusscan *
ibm lotus notes 6.5.4