ConeXware PowerArchiver BlackHole Archive Handling Buffer Overflow Vulnerability

BID:25938

Info

ConeXware PowerArchiver BlackHole Archive Handling Buffer Overflow Vulnerability

Bugtraq ID: 25938
Class: Boundary Condition Error
CVE: CVE-2007-5279
Remote: Yes
Local: No
Published: Oct 05 2007 12:00AM
Updated: Nov 04 2008 07:35PM
Credit: JPCERT/CC reported this vulnerability.
Vulnerable: ConeXware PowerArchiver 2007 10.20.20
ConeXware PowerArchiver 9.62.3
ConeXware PowerArchiver 9.63
ConeXware PowerArchiver 9.61
ConeXware PowerArchiver 9.60
Not Vulnerable: ConeXware PowerArchiver 2007 10.20.21

Discussion

ConeXware PowerArchiver BlackHole Archive Handling Buffer Overflow Vulnerability

PowerArchiver is prone to a buffer-overflow vulnerability when handling malicious BlackHole archives.

A successful attack can allow a remote attacker to corrupt process memory by triggering an overflow condition when the application handles excessive data in the archive.

This vulnerability reportedly affects versions prior to PowerArchiver 10.20.21.

Exploit / POC

ConeXware PowerArchiver BlackHole Archive Handling Buffer Overflow Vulnerability

Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].

Solution / Fix

ConeXware PowerArchiver BlackHole Archive Handling Buffer Overflow Vulnerability

Solution:
The vendor has released PowerArchiver 10.20.21 to address this issue.


ConeXware PowerArchiver 9.60

ConeXware PowerArchiver 9.61

ConeXware PowerArchiver 9.63

ConeXware PowerArchiver 2007 10.20.20

ConeXware PowerArchiver 9.62.3

References

ConeXware PowerArchiver BlackHole Archive Handling Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report