Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2004-0575
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft压缩文件夹远程任意命令执行漏洞(MS04-034)
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows包含对ZIP压缩文件夹的支持。 Microsoft Windows处理ZIP压缩文件夹的DUNZIP32.DLL模块存在缓冲区溢出,远程攻击者可以利用这个漏洞以登录用户进程权限在系统上执行任意指令。 当ZIP文件包含一个超长文件名时(超过0x8000字节),在Windows shell中以ZIP压缩文件夹打开时,会触发缓冲区溢出,允许异常处理被覆盖及EIP被劫持。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2004-0575
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2004-0575
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2004-0575

No comments yet


Leave a comment