by Tan Chew Keong
Release Date: 2006-07-25
A vulnerability has been found in PowerArchiver. When exploited, the vulnerability allows execution of arbitrary code when the user adds a file to a malicious ZIP archive.
PowerArchiver version 9.62.03 (English)
This advisory discloses a buffer overflow vulnerability in PowerArchiver. The stack-based buffer overflow occurs when PowerArchiver is attempting to add a file to a ZIP archive that contains a file with an overly long filename. It is possible to exploit the buffer overflow to execute arbitrary code.
In order to exploit this vulnerability successfully, the user must be convinced to open a malicious ZIP archive and to add a file to the archive.
The buffer overflow occurs in DZIPS32.DLL (version 220.127.116.11) that is distributed with PowerArchiver.
The buffer overflow occurs in a function that resembles the following in DZIPS32.DLL.
func_20009B20(arg_0, arg_4, arg_8)
char buffer[0x800]; // 2048 bytes
var1 = 0;
var2 = 0;
var3 = 0;
var9 = 0;
var11 = 0;
// Both cases will cause buffer overflow in "buffer"
// when filename of compressed file is > 2048 bytes
if(arg_8->someFlag == 0)
POC / Test Code
The following POC ZIP file will exploit the vulnerability in PowerArchiver to execute the harmless calculator (calc.exe). The POC has been successfully tested on English Windows XP SP2.
- Run PowerArchiver
- Click on the "Open" button or select "File->Open Archive..." from the menu.
- Select the POC ZIP file from the File-Open Dialog Box and click "Open".
- Click on the "Add" button or select "Actions->Add.." from the menu.
- Choose any file in the File-Selection dialog box and click "Add".
- Successful exploit will run calculator (calc.exe). Failed exploit will crash PowerArchiver.
Patch / Workaround
Update to version 9.63.
2006-07-08 - Vulnerability Discovered.
2006-07-17 - Initial Vendor Notification.
2006-07-25 - Vendor Released Fixed Version.
2006-07-25 - Public Release.