Executive Summary

Informations
Name CVE-2007-3375 First vendor Publication 2007-06-25
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in Lhaca File Archiver before 1.21 allows user-assisted remote attackers to execute arbitrary code via a crafted LZH archive, as exploited by malware such as Trojan.Lhdropper.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3375

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

Open Source Vulnerability Database (OSVDB)

Id Description
5753 LHA get_header() Function File / Directory Name Handling Overflow

A remote overflow exists in LHA. The get_header() function fails to perform proper bounds checking resulting in a buffer overflow. By sending an LHA archive containing files with overly long file or directory names, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-515.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://secunia.com/advisories/25826
http://vuln.sg/lhaca121-en.html
http://www.kb.cert.org/vuls/id/871497
http://www.securityfocus.com/bid/24604
http://www.symantec.com/enterprise/security_response/weblog/2007/06/beware_of...
http://www.symantec.com/security_response/writeup.jsp?docid=2007-062506-5500-...
https://exchange.xforce.ibmcloud.com/vulnerabilities/35116
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:17:02
  • Multiple Updates
2024-11-28 12:12:42
  • Multiple Updates
2021-04-22 01:06:34
  • Multiple Updates
2020-05-23 01:38:23
  • Multiple Updates
2020-05-23 00:19:59
  • Multiple Updates
2017-07-29 12:02:20
  • Multiple Updates
2016-04-26 16:17:11
  • Multiple Updates
2014-02-17 10:40:38
  • Multiple Updates
2013-05-11 10:29:19
  • Multiple Updates