TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Typical M$ User
date: 2004-03-12 17:23:22
subject: Re: winzip exploit

From: Typical M$ User 

On Fri, 27 Feb 2004 13:22:11 -0500, "Geo."
 blurted:

>WinZip MIME Parsing Buffer Overflow Vulnerability
>iDEFENSE Security Advisory 02.27.04a:
>http://www.idefense.com/application/poi/display?id=76&type=vulnerabiliti
>When providing long strings to
>certain parameters of MIME archives (.mim, .uue, .uu, .b64, .bhx, .hqx
>and .xxe extensions) WinZip will crash referencing an "internal error in
>file misc.c line 132".

Thanks

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.