Multiple stack-based buffer overflows in Lhaz before 1.32 allow user-assisted attackers to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing an error message. This vulnerability is addressed in the following product release:
Lhaz, Lhaz, 1.32
Publication date: Tue, 15 Aug 2006 02:04:00 +0000