ID

VAR-200501-0243


CVE

CVE-2004-1096


TITLE

Archive::Zip may not properly parse the file sizes of Zip archives

Trust: 0.8

sources: CERT/CC: VU#492545

DESCRIPTION

Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system. Archive::Zip does not properly parse Zip files and may incorrectly interpret malformed zip archives to contain zero length/size files. As a a result, anti-virus software using Archive::Zip may fail to detect malicious content within a Zip archive. Archive::Zip is a free perl module for working with zip compressed files. Archive::Zip versions prior to 1.14 have security bypass vulnerabilities when used in antivirus programs

Trust: 1.71

sources: NVD: CVE-2004-1096 // CERT/CC: VU#492545 // VULHUB: VHN-9526

AFFECTED PRODUCTS

vendor:susemodel:linuxscope:eqversion:9.2

Trust: 1.6

vendor:sophosmodel:anti-virusscope:eqversion:3.85

Trust: 1.0

vendor:broadcommodel:etrust antivirus gatewayscope:eqversion:7.1

Trust: 1.0

vendor:rav antivirusmodel:desktopscope:eqversion:8.6

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.78d

Trust: 1.0

vendor:broadcommodel:etrust antivirusscope:eqversion:7.1

Trust: 1.0

vendor:broadcommodel:etrust ez armorscope:eqversion:2.3

Trust: 1.0

vendor:kaspersky labmodel:anti-virusscope:eqversion:5.0

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.83

Trust: 1.0

vendor:rav antivirusmodel:for file serversscope:eqversion:1.0

Trust: 1.0

vendor:sophosmodel:puremessage anti-virusscope:eqversion:4.6

Trust: 1.0

vendor:kaspersky labmodel:anti-virusscope:eqversion:3.0

Trust: 1.0

vendor:esetmodel:nod32 antivirusscope:eqversion:1.0.12

Trust: 1.0

vendor:broadcommodel:etrust secure content managerscope:eqversion:1.1

Trust: 1.0

vendor:kaspersky labmodel:anti-virusscope:eqversion:4.0

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.81

Trust: 1.0

vendor:mandrakesoftmodel:mandrake linuxscope:eqversion:10.1

Trust: 1.0

vendor:esetmodel:nod32 antivirusscope:eqversion:1.0.13

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.84

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.79

Trust: 1.0

vendor:broadcommodel:etrust ez antivirusscope:eqversion:6.2

Trust: 1.0

vendor:broadcommodel:etrust antivirus gatewayscope:eqversion:7.0

Trust: 1.0

vendor:rav antivirusmodel:for mail serversscope:eqversion:8.4.2

Trust: 1.0

vendor:broadcommodel:etrust intrusion detectionscope:eqversion:1.4.1.13

Trust: 1.0

vendor:broadcommodel:etrust antivirusscope:eqversion:7.0

Trust: 1.0

vendor:broadcommodel:etrust secure content managerscope:eqversion:1.0

Trust: 1.0

vendor:gentoomodel:linuxscope:eqversion:*

Trust: 1.0

vendor:gentoomodel:linuxscope:eqversion:1.4

Trust: 1.0

vendor:broadcommodel:etrust intrusion detectionscope:eqversion:1.5

Trust: 1.0

vendor:broadcommodel:etrust ez armorscope:eqversion:2.4

Trust: 1.0

vendor:esetmodel:nod32 antivirusscope:eqversion:1.0.11

Trust: 1.0

vendor:broadcommodel:etrust ez antivirusscope:eqversion:6.1

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.86

Trust: 1.0

vendor:broadcommodel:brightstor arcserve backupscope:eqversion:11.1

Trust: 1.0

vendor:sophosmodel:small business suitescope:eqversion:1.0

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.80

Trust: 1.0

vendor:broadcommodel:inoculateitscope:eqversion:6.0

Trust: 1.0

vendor:broadcommodel:etrust intrusion detectionscope:eqversion:1.4.5

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.78

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.4.6

Trust: 1.0

vendor:broadcommodel:etrust ez antivirusscope:eqversion:6.3

Trust: 1.0

vendor:broadcommodel:etrust ez armorscope:eqversion:2.0

Trust: 1.0

vendor:camodel:etrust antivirusscope:eqversion:7.0_sp2

Trust: 1.0

vendor:camodel:etrust secure content managerscope:eqversion:1.0

Trust: 1.0

vendor:sophosmodel:anti-virusscope:eqversion:3.82

Trust: 1.0

vendor:mcafeemodel:antivirus enginescope:eqversion:4.3.20

Trust: 1.0

vendor:cpanmodel: - scope: - version: -

Trust: 0.8

sources: CERT/CC: VU#492545 // CNNVD: CNNVD-200501-061 // NVD: CVE-2004-1096

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-1096
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#492545
value: 3.59

Trust: 0.8

CNNVD: CNNVD-200501-061
value: HIGH

Trust: 0.6

VULHUB: VHN-9526
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2004-1096
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-9526
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#492545 // VULHUB: VHN-9526 // CNNVD: CNNVD-200501-061 // NVD: CVE-2004-1096

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-1096

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200501-061

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200501-061

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-9526

PATCH

title:Archive::Zip AntiVirus Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=146865

Trust: 0.6

sources: CNNVD: CNNVD-200501-061

EXTERNAL IDS

db:CERT/CCid:VU#492545

Trust: 2.5

db:SECUNIAid:13038

Trust: 1.7

db:BIDid:11448

Trust: 1.7

db:NVDid:CVE-2004-1096

Trust: 1.7

db:CNNVDid:CNNVD-200501-061

Trust: 0.7

db:EXPLOIT-DBid:629

Trust: 0.1

db:VULHUBid:VHN-9526

Trust: 0.1

sources: CERT/CC: VU#492545 // VULHUB: VHN-9526 // CNNVD: CNNVD-200501-061 // NVD: CVE-2004-1096

REFERENCES

url:http://www.securityfocus.com/bid/11448

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/492545

Trust: 1.7

url:http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdksa-2004:118

Trust: 1.7

url:http://secunia.com/advisories/13038/

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/17761

Trust: 1.7

url:http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true

Trust: 1.6

url:http://www.linuxsecurity.com/advisories/gentoo_advisory-5043.html

Trust: 0.8

url:http://rt.cpan.org/noauth/bug.html?id=8077

Trust: 0.8

url:http://www.idefense.com/application/poi/display?id=153

Trust: 0.8

url:http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true

Trust: 0.1

sources: CERT/CC: VU#492545 // VULHUB: VHN-9526 // CNNVD: CNNVD-200501-061 // NVD: CVE-2004-1096

SOURCES

db:CERT/CCid:VU#492545
db:VULHUBid:VHN-9526
db:CNNVDid:CNNVD-200501-061
db:NVDid:CVE-2004-1096

LAST UPDATE DATE

2024-08-14T13:51:14.357000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#492545date:2004-11-15T00:00:00
db:VULHUBid:VHN-9526date:2017-07-11T00:00:00
db:CNNVDid:CNNVD-200501-061date:2021-04-08T00:00:00
db:NVDid:CVE-2004-1096date:2021-04-09T17:00:09.303

SOURCES RELEASE DATE

db:CERT/CCid:VU#492545date:2004-11-12T00:00:00
db:VULHUBid:VHN-9526date:2005-01-10T00:00:00
db:CNNVDid:CNNVD-200501-061date:2005-01-10T00:00:00
db:NVDid:CVE-2004-1096date:2005-01-10T05:00:00