what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

secunia-AutoVue.txt

secunia-AutoVue.txt
Posted Jul 28, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in AutoVue SolidModel Professional Desktop Edition, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the handling of ARJ, RAR, and ZIP archives. This can be exploited to cause a stack-based buffer overflow when a malicious archive containing a file with an overly long filename is opened. Successful exploitation allows execution of arbitrary code. AutoVue SolidModel Professional Desktop Edition version 19.1 Build 5993 is affected. Other versions may also be affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-3350
SHA-256 | e93adff3a8f625d54d58dc9486926383f88de6f10f23d5b6f9a008feef926f49

secunia-AutoVue.txt

Change Mirror Download
====================================================================== 

Secunia Research 26/07/2006

- AutoVue SolidModel Professional Buffer Overflow Vulnerability -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

======================================================================
1) Affected Software

* AutoVue SolidModel Professional Desktop Edition
version 19.1 Build 5993.

Other versions may also be affected.

======================================================================
2) Severity

Rating: Moderately Critical
Impact: System Access
Where: Remote

======================================================================
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in AutoVue SolidModel
Professional Desktop Edition, which can be exploited by malicious
people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the
handling of ARJ, RAR, and ZIP archives. This can be exploited to cause
a stack-based buffer overflow when a malicious archive containing a
file with an overly long filename is opened.

Successful exploitation allows execution of arbitrary code.

======================================================================
4) Solution

Do not open untrusted archives.

======================================================================
5) Time Table

07/07/2006 - Initial vendor notification.
12/07/2006 - Second vendor notification.
19/07/2006 - Third vendor notification.
26/07/2006 - Public disclosure.

======================================================================
6) Credits

Discovered by Tan Chew Keong, Secunia Research.

======================================================================
7) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2006-3350 for the vulnerability.

======================================================================
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
9) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-56/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================



Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close