{"api_version":"1","generated_at":"2026-05-13T06:37:08+00:00","cve":"CVE-2004-1094","urls":{"html":"https://cve.report/CVE-2004-1094","api":"https://cve.report/api/cve/CVE-2004-1094.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2004-1094","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2004-1094"},"summary":{"title":"CVE-2004-1094","description":"Buffer overflow in InnerMedia DynaZip DUNZIP32.dll file version 5.00.03 and earlier allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, as demonstrated using (1) a .rjs (skin) file in RealPlayer 10 through RealPlayer 10.5 (6.0.12.1053), RealOne Player 1 and 2, (2) the Restore Backup function in CheckMark Software Payroll 2004/2005 3.9.6 and earlier, (3) CheckMark MultiLedger before 7.0.2, (4) dtSearch 6.x and 7.x, (5) mcupdmgr.exe and mghtml.exe in McAfee VirusScan 10 Build 10.0.21 and earlier, (6) IBM Lotus Notes before 6.5.5, and other products.  NOTE: it is unclear whether this is the same vulnerability as CVE-2004-0575, although the data manipulations are the same.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-01-10 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.networksecurity.fi/advisories/payroll.html","name":"http://www.networksecurity.fi/advisories/payroll.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"This domain name is registered with Netim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://service.real.com/help/faq/security/041026_player/EN/","name":"http://service.real.com/help/faq/security/041026_player/EN/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Customer Support - Real Security Updates","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html","name":"http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecuriTeam - CheckMark MultiLedger Buffer Overflow Vulnerability (DUNZIP32.dll)","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=109894226007607&w=2","name":"http://marc.info/?l=bugtraq&m=109894226007607&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'High Risk Vulnerability in RealPlayer' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1176","name":"http://www.vupen.com/english/advisories/2006/1176","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17096","name":"http://secunia.com/advisories/17096","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"CheckMark Payroll DUNZIP32.dll Buffer Overflow Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1011944","name":"http://securitytracker.com/id?1011944","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - RealPlayer Skin File Buffer Overflow May Let Remote Users Run Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/582498","name":"http://www.kb.cert.org/vuls/id/582498","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Vulnerability Note VU#582498","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html","name":"http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Neohapsis Archives - Full Disclosure List - #1044 - [Full-Disclosure] EEYE: RealPlayer Zipped Skin File Buffer Overflow","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://securitytracker.com/id?1012297","name":"http://securitytracker.com/id?1012297","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - DynaZip Buffer Overflow in Processing Long Filenames May Let Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.networksecurity.fi/advisories/dtsearch.html","name":"http://www.networksecurity.fi/advisories/dtsearch.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"This domain name is registered with Netim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.networksecurity.fi/advisories/lotus-notes.html","name":"http://www.networksecurity.fi/advisories/lotus-notes.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"This domain name is registered with Netim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2005/2057","name":"http://www.vupen.com/english/advisories/2005/2057","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.networksecurity.fi/advisories/multiledger.html","name":"http://www.networksecurity.fi/advisories/multiledger.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"This domain name is registered with Netim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19451","name":"http://secunia.com/advisories/19451","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/11555","name":"http://www.securityfocus.com/bid/11555","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"InnerMedia DynaZip Remote Stack Based Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securityfocus.com/archive/1/445369/100/0/threaded","name":"http://www.securityfocus.com/archive/1/445369/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016817","name":"http://securitytracker.com/id?1016817","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM Lotus Notes Buffer Overflow in 'DUNZIP32.dll' Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17879","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17879","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/18194","name":"http://secunia.com/advisories/18194","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"dtSearch DUNZIP32.dll Buffer Overflow Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/296","name":"http://securityreason.com/securityalert/296","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason - dtSearch DUNZIP32.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/420274/100/0/threaded","name":"http://www.securityfocus.com/archive/1/420274/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17394","name":"http://secunia.com/advisories/17394","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - CheckMark MultiLedger DUNZIP32.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/429361/100/0/threaded","name":"http://www.securityfocus.com/archive/1/429361/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.networksecurity.fi/advisories/mcafee-virusscan.html","name":"http://www.networksecurity.fi/advisories/mcafee-virusscan.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"This domain name is registered with Netim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/653","name":"http://securityreason.com/securityalert/653","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/19906","name":"http://www.osvdb.org/19906","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22737","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22737","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2004-1094","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1094","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"checkmark_payroll","cpe6":"3.7.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"checkmark_payroll","cpe6":"3.9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"checkmark_payroll","cpe6":"3.9.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"checkmark_payroll","cpe6":"3.9.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"checkmark_payroll","cpe6":"3.9.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"checkmark_payroll","cpe6":"3.9.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"3.9.6","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"checkmark_payroll","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"multiledger","cpe6":"6.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"multiledger","cpe6":"6.0.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"multiledger","cpe6":"7.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"7.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkmark","cpe5":"multiledger","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"innermedia","cpe5":"dynazip_library","cpe6":"5.00.00","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"innermedia","cpe5":"dynazip_library","cpe6":"5.00.01","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"innermedia","cpe5":"dynazip_library","cpe6":"5.00.02","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"innermedia","cpe5":"dynazip_library","cpe6":"5.00.03","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realone_player","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realone_player","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realplayer","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realplayer","cpe6":"10.0_6.0.12.690","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realplayer","cpe6":"10.0_beta","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realplayer","cpe6":"10.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realplayer","cpe6":"10.5_6.0.12.1016_beta","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realplayer","cpe6":"10.5_6.0.12.1040","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"1094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"realnetworks","cpe5":"realplayer","cpe6":"10.5_6.0.12.1053","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T00:39:00.897Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20051223 dtSearch DUNZIP32.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/420274/100/0/threaded"},{"name":"1011944","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1011944"},{"name":"20041027 EEYE: RealPlayer Zipped Skin File Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html"},{"name":"payroll-dunzip32-bo(22737)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22737"},{"name":"19906","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/19906"},{"name":"ADV-2005-2057","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2057"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.networksecurity.fi/advisories/lotus-notes.html"},{"name":"20041027 High Risk Vulnerability in RealPlayer","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=109894226007607&w=2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.networksecurity.fi/advisories/payroll.html"},{"name":"19451","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19451"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.networksecurity.fi/advisories/dtsearch.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.networksecurity.fi/advisories/mcafee-virusscan.html"},{"name":"11555","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/11555"},{"name":"17394","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17394"},{"name":"realplayer-dunzip32-bo(17879)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17879"},{"name":"20060330 McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/429361/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.networksecurity.fi/advisories/multiledger.html"},{"name":"20060906 IBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/445369/100/0/threaded"},{"name":"VU#582498","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/582498"},{"name":"1012297","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1012297"},{"name":"ADV-2006-1176","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1176"},{"name":"1016817","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016817"},{"name":"18194","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18194"},{"name":"653","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/653"},{"name":"296","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/296"},{"name":"17096","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17096"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://service.real.com/help/faq/security/041026_player/EN/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2004-10-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in InnerMedia DynaZip DUNZIP32.dll file version 5.00.03 and earlier allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, as demonstrated using (1) a .rjs (skin) file in RealPlayer 10 through RealPlayer 10.5 (6.0.12.1053), RealOne Player 1 and 2, (2) the Restore Backup function in CheckMark Software Payroll 2004/2005 3.9.6 and earlier, (3) CheckMark MultiLedger before 7.0.2, (4) dtSearch 6.x and 7.x, (5) mcupdmgr.exe and mghtml.exe in McAfee VirusScan 10 Build 10.0.21 and earlier, (6) IBM Lotus Notes before 6.5.5, and other products.  NOTE: it is unclear whether this is the same vulnerability as CVE-2004-0575, although the data manipulations are the same."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20051223 dtSearch DUNZIP32.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/420274/100/0/threaded"},{"name":"1011944","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1011944"},{"name":"20041027 EEYE: RealPlayer Zipped Skin File Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html"},{"name":"payroll-dunzip32-bo(22737)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22737"},{"name":"19906","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/19906"},{"name":"ADV-2005-2057","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2057"},{"tags":["x_refsource_MISC"],"url":"http://www.networksecurity.fi/advisories/lotus-notes.html"},{"name":"20041027 High Risk Vulnerability in RealPlayer","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=109894226007607&w=2"},{"tags":["x_refsource_MISC"],"url":"http://www.networksecurity.fi/advisories/payroll.html"},{"name":"19451","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19451"},{"tags":["x_refsource_MISC"],"url":"http://www.networksecurity.fi/advisories/dtsearch.html"},{"tags":["x_refsource_MISC"],"url":"http://www.networksecurity.fi/advisories/mcafee-virusscan.html"},{"name":"11555","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/11555"},{"name":"17394","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17394"},{"name":"realplayer-dunzip32-bo(17879)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17879"},{"name":"20060330 McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/429361/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.networksecurity.fi/advisories/multiledger.html"},{"name":"20060906 IBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/445369/100/0/threaded"},{"name":"VU#582498","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/582498"},{"name":"1012297","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1012297"},{"name":"ADV-2006-1176","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1176"},{"name":"1016817","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016817"},{"name":"18194","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18194"},{"name":"653","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/653"},{"name":"296","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/296"},{"name":"17096","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17096"},{"tags":["x_refsource_CONFIRM"],"url":"http://service.real.com/help/faq/security/041026_player/EN/"},{"tags":["x_refsource_MISC"],"url":"http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2004-1094","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in InnerMedia DynaZip DUNZIP32.dll file version 5.00.03 and earlier allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, as demonstrated using (1) a .rjs (skin) file in RealPlayer 10 through RealPlayer 10.5 (6.0.12.1053), RealOne Player 1 and 2, (2) the Restore Backup function in CheckMark Software Payroll 2004/2005 3.9.6 and earlier, (3) CheckMark MultiLedger before 7.0.2, (4) dtSearch 6.x and 7.x, (5) mcupdmgr.exe and mghtml.exe in McAfee VirusScan 10 Build 10.0.21 and earlier, (6) IBM Lotus Notes before 6.5.5, and other products.  NOTE: it is unclear whether this is the same vulnerability as CVE-2004-0575, although the data manipulations are the same."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20051223 dtSearch DUNZIP32.dll Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/420274/100/0/threaded"},{"name":"1011944","refsource":"SECTRACK","url":"http://securitytracker.com/id?1011944"},{"name":"20041027 EEYE: RealPlayer Zipped Skin File Buffer Overflow","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/fulldisclosure/2004-10/1044.html"},{"name":"payroll-dunzip32-bo(22737)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22737"},{"name":"19906","refsource":"OSVDB","url":"http://www.osvdb.org/19906"},{"name":"ADV-2005-2057","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/2057"},{"name":"http://www.networksecurity.fi/advisories/lotus-notes.html","refsource":"MISC","url":"http://www.networksecurity.fi/advisories/lotus-notes.html"},{"name":"20041027 High Risk Vulnerability in RealPlayer","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=109894226007607&w=2"},{"name":"http://www.networksecurity.fi/advisories/payroll.html","refsource":"MISC","url":"http://www.networksecurity.fi/advisories/payroll.html"},{"name":"19451","refsource":"SECUNIA","url":"http://secunia.com/advisories/19451"},{"name":"http://www.networksecurity.fi/advisories/dtsearch.html","refsource":"MISC","url":"http://www.networksecurity.fi/advisories/dtsearch.html"},{"name":"http://www.networksecurity.fi/advisories/mcafee-virusscan.html","refsource":"MISC","url":"http://www.networksecurity.fi/advisories/mcafee-virusscan.html"},{"name":"11555","refsource":"BID","url":"http://www.securityfocus.com/bid/11555"},{"name":"17394","refsource":"SECUNIA","url":"http://secunia.com/advisories/17394"},{"name":"realplayer-dunzip32-bo(17879)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17879"},{"name":"20060330 McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/429361/100/0/threaded"},{"name":"http://www.networksecurity.fi/advisories/multiledger.html","refsource":"MISC","url":"http://www.networksecurity.fi/advisories/multiledger.html"},{"name":"20060906 IBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/445369/100/0/threaded"},{"name":"VU#582498","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/582498"},{"name":"1012297","refsource":"SECTRACK","url":"http://securitytracker.com/id?1012297"},{"name":"ADV-2006-1176","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1176"},{"name":"1016817","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016817"},{"name":"18194","refsource":"SECUNIA","url":"http://secunia.com/advisories/18194"},{"name":"653","refsource":"SREASON","url":"http://securityreason.com/securityalert/653"},{"name":"296","refsource":"SREASON","url":"http://securityreason.com/securityalert/296"},{"name":"17096","refsource":"SECUNIA","url":"http://secunia.com/advisories/17096"},{"name":"http://service.real.com/help/faq/security/041026_player/EN/","refsource":"CONFIRM","url":"http://service.real.com/help/faq/security/041026_player/EN/"},{"name":"http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html","refsource":"MISC","url":"http://www.securiteam.com/windowsntfocus/6Z00W00EAM.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2004-1094","datePublished":"2004-12-01T05:00:00.000Z","dateReserved":"2004-11-30T00:00:00.000Z","dateUpdated":"2024-08-08T00:39:00.897Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-01-10 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:checkmark_payroll:*:*:*:*:*:*:*:*","versionEndIncluding":"3.9.6","matchCriteriaId":"8F03FD8A-3D6A-4AA4-AF44-C5E6D2EC4A0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:checkmark_payroll:3.7.5:*:*:*:*:*:*:*","matchCriteriaId":"2F0F8527-D7CE-4365-845C-0D2E3ADB579D"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:checkmark_payroll:3.9.1:*:*:*:*:*:*:*","matchCriteriaId":"A12948D5-551C-4063-975C-176959B04C61"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:checkmark_payroll:3.9.2:*:*:*:*:*:*:*","matchCriteriaId":"F29C2D79-9B0B-4D1C-AFB3-FC624758C14D"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:checkmark_payroll:3.9.3:*:*:*:*:*:*:*","matchCriteriaId":"541E43DF-2B83-472F-9A44-12E5AFFFE81F"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:checkmark_payroll:3.9.4:*:*:*:*:*:*:*","matchCriteriaId":"38169566-A98A-48B9-AF3F-7A3C3EF0206D"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:checkmark_payroll:3.9.5:*:*:*:*:*:*:*","matchCriteriaId":"BE4FC763-D8A3-4160-98F4-AE8D193E8B00"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:multiledger:*:*:*:*:*:*:*:*","versionEndIncluding":"7.0.1","matchCriteriaId":"67ABAD27-9D35-486F-9C31-640F6D64CBEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:multiledger:6.0.3:*:*:*:*:*:*:*","matchCriteriaId":"BE203C3A-3BC9-41F9-B53A-4734C43BE27F"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:multiledger:6.0.5:*:*:*:*:*:*:*","matchCriteriaId":"153CA3EB-BC3D-43E7-821D-7E80BD132189"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkmark:multiledger:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"EDBAEBB4-C04A-4897-968C-AE31E05412F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:innermedia:dynazip_library:5.00.00:*:*:*:*:*:*:*","matchCriteriaId":"EB059902-0581-4887-B597-6CE72321B884"},{"vulnerable":true,"criteria":"cpe:2.3:a:innermedia:dynazip_library:5.00.01:*:*:*:*:*:*:*","matchCriteriaId":"917CCDEC-86E3-4F1D-A2EF-9F636029AC25"},{"vulnerable":true,"criteria":"cpe:2.3:a:innermedia:dynazip_library:5.00.02:*:*:*:*:*:*:*","matchCriteriaId":"36BFF270-B270-404C-8B6F-067B0626F2D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:innermedia:dynazip_library:5.00.03:*:*:*:*:*:*:*","matchCriteriaId":"7F86FBC0-8E5C-47AB-B8BC-09B39DC64420"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*","matchCriteriaId":"7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*","matchCriteriaId":"CF6535A6-6647-4E60-B5AA-24DFC06360AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*","matchCriteriaId":"CD49D16C-B0AC-4228-9984-010661596232"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:*","matchCriteriaId":"01513F87-049E-46A9-A573-A7AF27EB30C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*","matchCriteriaId":"9FDC43D9-C93E-4FB4-B05B-9FB519B03DCA"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*","matchCriteriaId":"348F3214-E5C2-4D39-916F-1B0263D13F40"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:*","matchCriteriaId":"169753E3-949F-4B7D-9955-A52240CB8E6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*","matchCriteriaId":"91278EFD-0285-4389-9C53-50FE225C3C19"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1053:*:*:*:*:*:*:*","matchCriteriaId":"336246FA-A06F-4792-9923-E6948F3494FB"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2004","CveId":"1094","Ordinal":"1","Title":"CVE-2004-1094","CVE":"CVE-2004-1094","Year":"2004"},"notes":[{"CveYear":"2004","CveId":"1094","Ordinal":"1","NoteData":"Buffer overflow in InnerMedia DynaZip DUNZIP32.dll file version 5.00.03 and earlier allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, as demonstrated using (1) a .rjs (skin) file in RealPlayer 10 through RealPlayer 10.5 (6.0.12.1053), RealOne Player 1 and 2, (2) the Restore Backup function in CheckMark Software Payroll 2004/2005 3.9.6 and earlier, (3) CheckMark MultiLedger before 7.0.2, (4) dtSearch 6.x and 7.x, (5) mcupdmgr.exe and mghtml.exe in McAfee VirusScan 10 Build 10.0.21 and earlier, (6) IBM Lotus Notes before 6.5.5, and other products.  NOTE: it is unclear whether this is the same vulnerability as CVE-2004-0575, although the data manipulations are the same.","Type":"Description","Title":"CVE-2004-1094"},{"CveYear":"2004","CveId":"1094","Ordinal":"2","NoteData":"2004-12-01","Type":"Other","Title":"Published"},{"CveYear":"2004","CveId":"1094","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}