CVE-2004-0234
Summary
| CVE | CVE-2004-0234 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-08-18 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Clearswift | Mailsweeper | 4.0 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.1 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.2 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.10 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.11 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.13 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.3 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.4 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.5 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.6 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.6_sp1 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.7 | All | All | All |
| Application | Clearswift | Mailsweeper | 4.3.8 | All | All | All |
| Application | F-secure | F-secure Anti-virus | 2003 | All | All | All |
| Application | F-secure | F-secure Anti-virus | 2004 | All | All | All |
| Application | F-secure | F-secure Anti-virus | 4.51 | All | linux_gateways | All |
| Application | F-secure | F-secure Anti-virus | 4.51 | All | linux_servers | All |
| Application | F-secure | F-secure Anti-virus | 4.51 | All | linux_workstations | All |
| Application | F-secure | F-secure Anti-virus | 4.52 | All | linux_gateways | All |
| Application | F-secure | F-secure Anti-virus | 4.52 | All | linux_servers | All |
| Application | F-secure | F-secure Anti-virus | 4.52 | All | linux_workstations | All |
| Application | F-secure | F-secure Anti-virus | 4.60 | All | samba_servers | All |
| Application | F-secure | F-secure Anti-virus | 5.41 | All | mimesweeper | All |
| Application | F-secure | F-secure Anti-virus | 5.41 | All | windows_servers | All |
| Application | F-secure | F-secure Anti-virus | 5.41 | All | workstations | All |
| Application | F-secure | F-secure Anti-virus | 5.42 | All | mimesweeper | All |
| Application | F-secure | F-secure Anti-virus | 5.42 | All | windows_servers | All |
| Application | F-secure | F-secure Anti-virus | 5.42 | All | workstations | All |
| Application | F-secure | F-secure Anti-virus | 5.5 | All | client_security | All |
| Application | F-secure | F-secure Anti-virus | 5.52 | All | client_security | All |
| Application | F-secure | F-secure Anti-virus | 6.21 | All | ms_exchange | All |
| Application | F-secure | F-secure For Firewalls | 6.20 | All | All | All |
| Application | F-secure | F-secure Internet Security | 2003 | All | All | All |
| Application | F-secure | F-secure Internet Security | 2004 | All | All | All |
| Application | F-secure | F-secure Personal Express | 4.5 | All | All | All |
| Application | F-secure | F-secure Personal Express | 4.6 | All | All | All |
| Application | F-secure | F-secure Personal Express | 4.7 | All | All | All |
| Application | F-secure | Internet Gatekeeper | 6.31 | All | All | All |
| Application | F-secure | Internet Gatekeeper | 6.32 | All | All | All |
| Application | Rarlab | Winrar | 3.20 | All | All | All |
| Operating System | Redhat | Fedora Core | core_1.0 | All | All | All |
| Application | Redhat | Lha | 1.14i-9 | All | i386 | All |
| Application | Sgi | Propack | 2.4 | All | All | All |
| Application | Sgi | Propack | 3.0 | All | All | All |
| Application | Stalker | Cgpmcafee | 3.2 | All | All | All |
| Application | Tsugio Okamoto | Lha | 1.14 | All | All | All |
| Application | Tsugio Okamoto | Lha | 1.15 | All | All | All |
| Application | Tsugio Okamoto | Lha | 1.17 | All | All | All |
| Application | Winzip | Winzip | 9.0 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.guay-leroux.com/projects/barracuda-advisory-LHA.txt | af854a3a-2127-422b-91ae-364da2661108 | www.guay-leroux.com | |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| '[Ulf Harnhammar]: LHA Advisory + Patch' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Debian -- Security Information -- DSA-515-1 lha | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| [Full-Disclosure] Lha local stack overflow Proof Of Concept Code | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| www.osvdb.org/5753 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| [Full-Disclosure] LHa buffer overflows and directory traversal problems | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | |
| archives.neohapsis.com/archives/bugtraq/2006-04/0059.html | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | |
| Barracuda Spam Firewall Archives Buffer Overflow Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Barracuda Spam Firewall Buffer Overflows in Processing LHA and ZOO Archives Let Remote Users Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| bugzilla.fedora.us/show_bug.cgi | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.fedora.us | |
| Gentoo Linux Documentation -- Multiple vulnerabilities in LHa | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| Multiple LHA Buffer Overflow/Directory Traversal Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit, Patch, Vendor Advisory |
| www.osvdb.org/5754 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| redhat.com | Red Hat, Inc. | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.