{"api_version":"1","generated_at":"2026-04-23T09:39:02+00:00","cve":"CVE-2005-2856","urls":{"html":"https://cve.report/CVE-2005-2856","api":"https://cve.report/api/cve/CVE-2005-2856.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-2856","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-2856"},"summary":{"title":"CVE-2005-2856","description":"Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-09-08 10:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-119","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/secunia_research/2006-27/","name":"http://secunia.com/secunia_research/2006-27/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Secunia Research - Anti-Trojan unacev2.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1775","name":"http://www.vupen.com/english/advisories/2006/1775","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016177","name":"http://securitytracker.com/id?1016177","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Rising Antivirus Stack Overflow in Scanning ACE Archives Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26480","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26480","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/433352/100/0/threaded","name":"http://www.securityfocus.com/archive/1/433352/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016065","name":"http://securitytracker.com/id?1016065","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Anti-Trojan Buffer Overflow in 'unacev2.dll' in Processing ACE Archives Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/433693/100/0/threaded","name":"http://www.securityfocus.com/archive/1/433693/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19612","name":"http://secunia.com/advisories/19612","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - Servant Salamander unacev2.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20270","name":"http://secunia.com/advisories/20270","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ZipTV ARJ Archive Handling and unacev2.dll Buffer Overflows - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/16479","name":"http://secunia.com/advisories/16479","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - ALZip ACE Archive Handling Buffer Overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19938","name":"http://secunia.com/advisories/19938","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Eazel unacev2.dll Buffer Overflow Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19977","name":"http://secunia.com/advisories/19977","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"PowerArchiver unacev2.dll Buffer Overflow Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19454","name":"http://secunia.com/advisories/19454","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - Total Commander unacev2.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434234/100/0/threaded","name":"http://www.securityfocus.com/archive/1/434234/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/19884","name":"http://www.securityfocus.com/bid/19884","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Microchip Data Systems ZipTV TZipTV ARJ File Handling Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/19596","name":"http://secunia.com/advisories/19596","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Secunia - Advisories - UltimateZip unacev2.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-30/advisory","name":"http://secunia.com/secunia_research/2006-30/advisory","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"FilZip unacev2.dll Buffer Overflow Vulnerability - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26447","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26447","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-38/advisory","name":"http://secunia.com/secunia_research/2006-38/advisory","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016011","name":"http://securitytracker.com/id?1016011","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Servant Salamander Buffer Overflow in 'unacev2.dll' Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/2824","name":"http://www.vupen.com/english/advisories/2006/2824","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/440303/100/0/threaded","name":"http://www.securityfocus.com/archive/1/440303/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1694","name":"http://www.vupen.com/english/advisories/2006/1694","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19458","name":"http://secunia.com/advisories/19458","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"WinHKI unacev2.dll Buffer Overflow Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016512","name":"http://securitytracker.com/id?1016512","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - BitZipper Buffer Overflow in Processing ACE Archives Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26982","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26982","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1725","name":"http://www.vupen.com/english/advisories/2006/1725","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26168","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26168","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/432357/100/0/threaded","name":"http://www.securityfocus.com/archive/1/432357/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1577","name":"http://www.vupen.com/english/advisories/2006/1577","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434011/100/0/threaded","name":"http://www.securityfocus.com/archive/1/434011/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=112621008228458&w=2","name":"http://marc.info/?l=bugtraq&m=112621008228458&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'Secunia Research: ALZip ACE Archive Handling Buffer Overflow' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/14759","name":"http://www.securityfocus.com/bid/14759","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Multiple Vendor UNACEV2 Archive File Name Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/1565","name":"http://www.vupen.com/english/advisories/2006/1565","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016114","name":"http://securitytracker.com/id?1016114","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Eazel Buffer Overflow in 'ztvunacev2.dll' in Processing ACE Archives Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-28/advisory","name":"http://secunia.com/secunia_research/2006-28/advisory","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Where Is It unacev2.dll Buffer Overflow Vulnerability - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-24/advisory","name":"http://secunia.com/secunia_research/2006-24/advisory","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/2184","name":"http://www.vupen.com/english/advisories/2006/2184","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1015852","name":"http://securitytracker.com/id?1015852","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Total Commander Buffer Overflow UNACEV2.DLL Lets Remote Users Cause Arbitrary Code to Be Executed - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26736","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26736","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/3495","name":"http://www.vupen.com/english/advisories/2006/3495","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26302","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26302","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/2047","name":"http://www.vupen.com/english/advisories/2006/2047","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19939","name":"http://secunia.com/advisories/19939","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"BitZipper unacev2.dll Buffer Overflow Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016115","name":"http://securitytracker.com/id?1016115","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IZArc Buffer Overflow in 'unacev2.dll' in Processing ACE Archives Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1681","name":"http://www.vupen.com/english/advisories/2006/1681","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1835","name":"http://www.vupen.com/english/advisories/2006/1835","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19581","name":"http://secunia.com/advisories/19581","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - ExtractNow unacev2.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-46/advisory/","name":"http://secunia.com/secunia_research/2006-46/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"BitZipper unacev2.dll Buffer Overflow Vulnerability - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19890","name":"http://secunia.com/advisories/19890","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"AutoMate unacev2.dll Buffer Overflow Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/434279/100/0/threaded","name":"http://www.securityfocus.com/archive/1/434279/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26142","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26142","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26385","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26385","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-33/advisory/","name":"http://secunia.com/secunia_research/2006-33/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/433258/100/0/threaded","name":"http://www.securityfocus.com/archive/1/433258/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016257","name":"http://securitytracker.com/id?1016257","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - AutoMate Buffer Overflow in 'unacev2.dll' Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1611","name":"http://www.vupen.com/english/advisories/2006/1611","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/432579/100/0/threaded","name":"http://www.securityfocus.com/archive/1/432579/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26479","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26479","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2005-41/advisory/","name":"http://secunia.com/secunia_research/2005-41/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1014863","name":"http://securitytracker.com/id?1014863","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ALZip Buffer Overflow UNACEV2.DLL Lets Remote Users Cause Arbitrary Code to Be Executed - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securityfocus.com/archive/1/436639/100/0/threaded","name":"http://www.securityfocus.com/archive/1/436639/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19967","name":"http://secunia.com/advisories/19967","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"IZArc unacev2.dll Buffer Overflow Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016088","name":"http://securitytracker.com/id?1016088","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"FilZip Buffer Overflow in 'unacev2.dll' in Processing ACE Archives Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26116","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26116","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1797","name":"http://www.vupen.com/english/advisories/2006/1797","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20009","name":"http://secunia.com/advisories/20009","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Rising Antivirus unacev2.dll Buffer Overflow Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-32/advisory/","name":"http://secunia.com/secunia_research/2006-32/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IZArc unacev2.dll Buffer Overflow Vulnerability - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19931","name":"http://secunia.com/advisories/19931","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Where Is It unacev2.dll Buffer Overflow Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-29/advisory/","name":"http://secunia.com/secunia_research/2006-29/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-36/advisory","name":"http://secunia.com/secunia_research/2006-36/advisory","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://securitytracker.com/id?1016066","name":"http://securitytracker.com/id?1016066","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"UltimateZIP Buffer Overflow in Extracting ACE Archives Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19975","name":"http://secunia.com/advisories/19975","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - Anti-Trojan unacev2.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27763","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27763","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28787","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28787","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-50/advisory/","name":"http://secunia.com/secunia_research/2006-50/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ZipTV ARJ Archive Handling and unacev2.dll Buffer Overflows - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/25129","name":"http://www.osvdb.org/25129","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://secunia.com/secunia_research/2006-25/advisory","name":"http://secunia.com/secunia_research/2006-25/advisory","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/19834","name":"http://secunia.com/advisories/19834","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Secunia - Advisories - FilZip unacev2.dll Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1016012","name":"http://securitytracker.com/id?1016012","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"WinHKI Buffer Overflow in 'ztvunacev2.dll' Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1836","name":"http://www.vupen.com/english/advisories/2006/1836","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26272","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26272","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/49","name":"http://securityreason.com/securityalert/49","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason - ALZip Multiple Archive Handling Buffer Overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26315","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26315","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-2856","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2856","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"2856","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"winace","cpe5":"winace","cpe6":"2.6.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T22:53:28.858Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"automate-unacev2-bo(26982)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"},{"name":"1016512","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016512"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-24/advisory"},{"name":"ADV-2006-2824","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/2824"},{"name":"49","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/49"},{"name":"19884","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/19884"},{"name":"eazel-ztvunacev2-bo(26479)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"},{"name":"ADV-2006-1797","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1797"},{"name":"20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/434279/100/0/threaded"},{"name":"1014863","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1014863"},{"name":"1016011","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016011"},{"name":"1016115","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016115"},{"name":"19939","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19939"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-46/advisory/"},{"name":"1016065","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016065"},{"name":"ADV-2006-1835","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1835"},{"name":"1016088","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016088"},{"name":"ADV-2006-3495","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/3495"},{"name":"19967","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19967"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-27/"},{"name":"1016177","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016177"},{"name":"1016114","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016114"},{"name":"powerarchiver-unacev2-ace-bo(26272)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-50/advisory/"},{"name":"20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/432579/100/0/threaded"},{"name":"19931","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19931"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-36/advisory"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-28/advisory"},{"name":"filzip-unacev2-bo(26447)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"},{"name":"19975","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19975"},{"name":"ADV-2006-1775","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1775"},{"name":"16479","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/16479"},{"name":"ultimatezip-unacev2-bo(26385)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"},{"name":"servant-salamander-unacev2-bo(26116)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"},{"name":"20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/436639/100/0/threaded"},{"name":"ADV-2006-1611","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1611"},{"name":"ADV-2006-1681","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1681"},{"name":"20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/433693/100/0/threaded"},{"name":"ADV-2006-2184","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/2184"},{"name":"ADV-2006-1577","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1577"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-33/advisory/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-29/advisory/"},{"name":"20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/434234/100/0/threaded"},{"name":"19938","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19938"},{"name":"19581","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19581"},{"name":"antitrojan-unacev2-bo(26302)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"},{"name":"ADV-2006-1694","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1694"},{"name":"20270","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20270"},{"name":"19890","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19890"},{"name":"19977","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19977"},{"name":"winhki-unacev2-bo(26142)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-38/advisory"},{"name":"19596","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19596"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2005-41/advisory/"},{"name":"1016066","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016066"},{"name":"20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/440303/100/0/threaded"},{"name":"19458","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19458"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-25/advisory"},{"name":"1016012","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016012"},{"name":"risingantivirus-unacev2-bo(26736)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-32/advisory/"},{"name":"19454","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19454"},{"name":"20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/433258/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2006-30/advisory"},{"name":"whereisit-unacev2-bo(26315)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"},{"name":"20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/432357/100/0/threaded"},{"name":"25129","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25129"},{"name":"bitzipper-unacev2-bo(27763)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"},{"name":"19834","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19834"},{"name":"20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/434011/100/0/threaded"},{"name":"tziptv-unacev2-bo(28787)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"},{"name":"20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/433352/100/0/threaded"},{"name":"20009","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20009"},{"name":"izarc-unacev2-bo(26480)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"},{"name":"ADV-2006-2047","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/2047"},{"name":"extractnow-unacev2-ace-bo(26168)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"},{"name":"14759","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/14759"},{"name":"ADV-2006-1836","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1836"},{"name":"1016257","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1016257"},{"name":"19612","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19612"},{"name":"ADV-2006-1565","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1565"},{"name":"ADV-2006-1725","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1725"},{"name":"1015852","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015852"},{"name":"20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=112621008228458&w=2"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-09-07T00:00:00.000Z","descriptions":[{"lang":"en","value":"Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"automate-unacev2-bo(26982)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"},{"name":"1016512","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016512"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-24/advisory"},{"name":"ADV-2006-2824","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/2824"},{"name":"49","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/49"},{"name":"19884","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/19884"},{"name":"eazel-ztvunacev2-bo(26479)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"},{"name":"ADV-2006-1797","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1797"},{"name":"20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/434279/100/0/threaded"},{"name":"1014863","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1014863"},{"name":"1016011","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016011"},{"name":"1016115","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016115"},{"name":"19939","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19939"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-46/advisory/"},{"name":"1016065","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016065"},{"name":"ADV-2006-1835","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1835"},{"name":"1016088","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016088"},{"name":"ADV-2006-3495","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/3495"},{"name":"19967","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19967"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-27/"},{"name":"1016177","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016177"},{"name":"1016114","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016114"},{"name":"powerarchiver-unacev2-ace-bo(26272)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-50/advisory/"},{"name":"20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/432579/100/0/threaded"},{"name":"19931","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19931"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-36/advisory"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-28/advisory"},{"name":"filzip-unacev2-bo(26447)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"},{"name":"19975","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19975"},{"name":"ADV-2006-1775","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1775"},{"name":"16479","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/16479"},{"name":"ultimatezip-unacev2-bo(26385)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"},{"name":"servant-salamander-unacev2-bo(26116)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"},{"name":"20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/436639/100/0/threaded"},{"name":"ADV-2006-1611","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1611"},{"name":"ADV-2006-1681","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1681"},{"name":"20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/433693/100/0/threaded"},{"name":"ADV-2006-2184","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/2184"},{"name":"ADV-2006-1577","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1577"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-33/advisory/"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-29/advisory/"},{"name":"20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/434234/100/0/threaded"},{"name":"19938","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19938"},{"name":"19581","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19581"},{"name":"antitrojan-unacev2-bo(26302)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"},{"name":"ADV-2006-1694","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1694"},{"name":"20270","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20270"},{"name":"19890","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19890"},{"name":"19977","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19977"},{"name":"winhki-unacev2-bo(26142)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-38/advisory"},{"name":"19596","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19596"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2005-41/advisory/"},{"name":"1016066","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016066"},{"name":"20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/440303/100/0/threaded"},{"name":"19458","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19458"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-25/advisory"},{"name":"1016012","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016012"},{"name":"risingantivirus-unacev2-bo(26736)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-32/advisory/"},{"name":"19454","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19454"},{"name":"20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/433258/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2006-30/advisory"},{"name":"whereisit-unacev2-bo(26315)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"},{"name":"20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/432357/100/0/threaded"},{"name":"25129","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25129"},{"name":"bitzipper-unacev2-bo(27763)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"},{"name":"19834","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19834"},{"name":"20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/434011/100/0/threaded"},{"name":"tziptv-unacev2-bo(28787)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"},{"name":"20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/433352/100/0/threaded"},{"name":"20009","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20009"},{"name":"izarc-unacev2-bo(26480)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"},{"name":"ADV-2006-2047","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/2047"},{"name":"extractnow-unacev2-ace-bo(26168)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"},{"name":"14759","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/14759"},{"name":"ADV-2006-1836","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1836"},{"name":"1016257","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1016257"},{"name":"19612","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19612"},{"name":"ADV-2006-1565","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1565"},{"name":"ADV-2006-1725","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1725"},{"name":"1015852","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015852"},{"name":"20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=112621008228458&w=2"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-2856","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"automate-unacev2-bo(26982)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26982"},{"name":"1016512","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016512"},{"name":"http://secunia.com/secunia_research/2006-24/advisory","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-24/advisory"},{"name":"ADV-2006-2824","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/2824"},{"name":"49","refsource":"SREASON","url":"http://securityreason.com/securityalert/49"},{"name":"19884","refsource":"BID","url":"http://www.securityfocus.com/bid/19884"},{"name":"eazel-ztvunacev2-bo(26479)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26479"},{"name":"ADV-2006-1797","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1797"},{"name":"20060517 Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434279/100/0/threaded"},{"name":"1014863","refsource":"SECTRACK","url":"http://securitytracker.com/id?1014863"},{"name":"1016011","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016011"},{"name":"1016115","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016115"},{"name":"19939","refsource":"SECUNIA","url":"http://secunia.com/advisories/19939"},{"name":"http://secunia.com/secunia_research/2006-46/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-46/advisory/"},{"name":"1016065","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016065"},{"name":"ADV-2006-1835","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1835"},{"name":"1016088","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016088"},{"name":"ADV-2006-3495","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/3495"},{"name":"19967","refsource":"SECUNIA","url":"http://secunia.com/advisories/19967"},{"name":"http://secunia.com/secunia_research/2006-27/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-27/"},{"name":"1016177","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016177"},{"name":"1016114","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016114"},{"name":"powerarchiver-unacev2-ace-bo(26272)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26272"},{"name":"http://secunia.com/secunia_research/2006-50/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-50/advisory/"},{"name":"20060501 Secunia Research: WinHKI unacev2.dll Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/432579/100/0/threaded"},{"name":"19931","refsource":"SECUNIA","url":"http://secunia.com/advisories/19931"},{"name":"http://secunia.com/secunia_research/2006-36/advisory","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-36/advisory"},{"name":"http://secunia.com/secunia_research/2006-28/advisory","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-28/advisory"},{"name":"filzip-unacev2-bo(26447)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26447"},{"name":"19975","refsource":"SECUNIA","url":"http://secunia.com/advisories/19975"},{"name":"ADV-2006-1775","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1775"},{"name":"16479","refsource":"SECUNIA","url":"http://secunia.com/advisories/16479"},{"name":"ultimatezip-unacev2-bo(26385)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26385"},{"name":"servant-salamander-unacev2-bo(26116)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26116"},{"name":"20060609 Secunia Research: AutoMate unacev2.dll Buffer OverflowVulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/436639/100/0/threaded"},{"name":"ADV-2006-1611","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1611"},{"name":"ADV-2006-1681","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1681"},{"name":"20060511 Secunia Research: UltimateZip unacev2.dll Buffer OverflowVulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/433693/100/0/threaded"},{"name":"ADV-2006-2184","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/2184"},{"name":"ADV-2006-1577","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1577"},{"name":"http://secunia.com/secunia_research/2006-33/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-33/advisory/"},{"name":"http://secunia.com/secunia_research/2006-29/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-29/advisory/"},{"name":"20060517 Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434234/100/0/threaded"},{"name":"19938","refsource":"SECUNIA","url":"http://secunia.com/advisories/19938"},{"name":"19581","refsource":"SECUNIA","url":"http://secunia.com/advisories/19581"},{"name":"antitrojan-unacev2-bo(26302)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26302"},{"name":"ADV-2006-1694","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1694"},{"name":"20270","refsource":"SECUNIA","url":"http://secunia.com/advisories/20270"},{"name":"19890","refsource":"SECUNIA","url":"http://secunia.com/advisories/19890"},{"name":"19977","refsource":"SECUNIA","url":"http://secunia.com/advisories/19977"},{"name":"winhki-unacev2-bo(26142)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26142"},{"name":"http://secunia.com/secunia_research/2006-38/advisory","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-38/advisory"},{"name":"19596","refsource":"SECUNIA","url":"http://secunia.com/advisories/19596"},{"name":"http://secunia.com/secunia_research/2005-41/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2005-41/advisory/"},{"name":"1016066","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016066"},{"name":"20060717 Secunia Research: BitZipper unacev2.dll Buffer OverflowVulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/440303/100/0/threaded"},{"name":"19458","refsource":"SECUNIA","url":"http://secunia.com/advisories/19458"},{"name":"http://secunia.com/secunia_research/2006-25/advisory","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-25/advisory"},{"name":"1016012","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016012"},{"name":"risingantivirus-unacev2-bo(26736)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26736"},{"name":"http://secunia.com/secunia_research/2006-32/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-32/advisory/"},{"name":"19454","refsource":"SECUNIA","url":"http://secunia.com/advisories/19454"},{"name":"20060508 Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/433258/100/0/threaded"},{"name":"http://secunia.com/secunia_research/2006-30/advisory","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-30/advisory"},{"name":"whereisit-unacev2-bo(26315)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26315"},{"name":"20060428 Secunia Research: Servant Salamander unacev2.dll Buffer OverflowVulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/432357/100/0/threaded"},{"name":"25129","refsource":"OSVDB","url":"http://www.osvdb.org/25129"},{"name":"bitzipper-unacev2-bo(27763)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27763"},{"name":"19834","refsource":"SECUNIA","url":"http://secunia.com/advisories/19834"},{"name":"20060515 Secunia Research: FilZip unacev2.dll Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/434011/100/0/threaded"},{"name":"tziptv-unacev2-bo(28787)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28787"},{"name":"20060509 Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/433352/100/0/threaded"},{"name":"20009","refsource":"SECUNIA","url":"http://secunia.com/advisories/20009"},{"name":"izarc-unacev2-bo(26480)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26480"},{"name":"ADV-2006-2047","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/2047"},{"name":"extractnow-unacev2-ace-bo(26168)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26168"},{"name":"14759","refsource":"BID","url":"http://www.securityfocus.com/bid/14759"},{"name":"ADV-2006-1836","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1836"},{"name":"1016257","refsource":"SECTRACK","url":"http://securitytracker.com/id?1016257"},{"name":"19612","refsource":"SECUNIA","url":"http://secunia.com/advisories/19612"},{"name":"ADV-2006-1565","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1565"},{"name":"ADV-2006-1725","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1725"},{"name":"1015852","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015852"},{"name":"20050908 Secunia Research: ALZip ACE Archive Handling Buffer Overflow","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=112621008228458&w=2"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-2856","datePublished":"2005-09-08T04:00:00.000Z","dateReserved":"2005-09-08T00:00:00.000Z","dateUpdated":"2024-08-07T22:53:28.858Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-09-08 10:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-119","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:winace:winace:2.6.0.0:*:*:*:*:*:*:*","matchCriteriaId":"64D2B1B2-B49D-4F22-B4C6-CE0FAF0FDF35"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"2856","Ordinal":"1","Title":"CVE-2005-2856","CVE":"CVE-2005-2856","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"2856","Ordinal":"1","NoteData":"Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.","Type":"Description","Title":"CVE-2005-2856"},{"CveYear":"2005","CveId":"2856","Ordinal":"2","NoteData":"2005-09-08","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"2856","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}