Code Injection in IZArc - CVE-2014-2720

 

Code Injection in IZArc - CVE-2014-2720

Published: May 27, 2014 / Updated: August 10, 2020


Vulnerability identifier: #VU41609
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2014-2720
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: izarc.org
Affected software:
IZArc

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

IZArc 4.1.8 displays a file's name on the basis of a ZIP archive's Central Directory entry, but launches this file on the basis of a ZIP archive's local file header, which allows user-assisted remote attackers to conduct file-extension spoofing attacks via a modified Central Directory, as demonstrated by unintended code execution prompted by a .jpg extension in the Central Directory and a .exe extension in the local file header.


How to mitigate CVE-2014-2720

Install update from vendor's website.

Sources