Unknown
CVE-2004-1094
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Buffer overflow in InnerMedia DynaZip DUNZIP32.dll file version 5.00.03 and earlier allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, as demonstrated using (1) a .rjs (skin) file in RealPlayer 10 through RealPlayer 10.5 (6.0.12.1053), RealOne Player 1 and 2, (2) the Restore Backup function in CheckMark Software Payroll 2004/2005 3.9.6 and earlier, (3) CheckMark MultiLedger before 7.0.2, (4) dtSearch 6.x and 7.x, (5) mcupdmgr.exe and mghtml.exe in McAfee VirusScan 10 Build 10.0.21 and earlier, (6) IBM Lotus Notes before 6.5.5, and other products. NOTE: it is unclear whether this is the same vulnerability as CVE-2004-0575, although the data manipulations are the same.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- checkmark payroll,
- checkmark payroll 3.7.5,
- checkmark payroll 3.9.1,
- checkmark payroll 3.9.2,
- checkmark payroll 3.9.3,
- checkmark payroll 3.9.4,
- checkmark payroll 3.9.5,
- dynazip library 5.00.00,
- dynazip library 5.00.01,
- dynazip library 5.00.02,
- dynazip library 5.00.03,
- multiledger,
- multiledger 6.0.3,
- multiledger 6.0.5,
- multiledger 7.0.0,
- realone player 1.0,
- realone player 2.0,
- realplayer 10.0,
- realplayer 10.0 6.0.12.690,
- realplayer 10.0 beta,
- realplayer 10.5,
- realplayer 10.5 6.0.12.1016 beta,
- realplayer 10.5 6.0.12.1040,
- realplayer 10.5 6.0.12.1053
Weaknesses
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: