Zero-day vulnerabilities discovered: 1
Buffer overflow
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in Lhaca File Archiver when processing .lzh archives. A remote attacker can create a specially crafted .lzh file, trick the victim into opening it, cause stack-based buffer overflow and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
Software: File Archiver
Known/fameous malware:
Trojan.Lhdropper