<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
	<title type="html"><![CDATA[DriverPacks.net Forum - 7z vulnerabilty]]></title>
	<link rel="self" href="http://forum.driverpacks.net/extern.php?action=feed&amp;tid=3706&amp;type=atom"/>
	<updated>2009-04-22T07:04:17Z</updated>
	<generator>PunBB</generator>
	<id>http://forum.driverpacks.net/viewtopic.php?id=3706</id>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30956#p30956"/>
			<content type="html"><![CDATA[<p>ROFL... </p><p>Well yeah... It would seem so!</p>]]></content>
			<author>
				<name><![CDATA[OverFlow]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=1097</uri>
			</author>
			<updated>2009-04-22T07:04:17Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30956#p30956</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30954#p30954"/>
			<content type="html"><![CDATA[<div class="quotebox"><cite>OverFlow wrote:</cite><blockquote><p>It is better to be safe than sorry...</p></blockquote></div><p>So now we are BOTH &quot;safe&quot; AND &quot;sorry&quot; <img src="http://forum.driverpacks.net/img/smilies/tongue.png" width="15" height="15" alt="tongue" /></p>]]></content>
			<author>
				<name><![CDATA[mr_smartepants]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=1602</uri>
			</author>
			<updated>2009-04-22T05:41:52Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30954#p30954</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30948#p30948"/>
			<content type="html"><![CDATA[<p>I got called on the carpet for my closing statement above in a Very Nice and Well Worded e-mail...</p><p>I received a link to here <a href="http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/">http://www.ee.oulu.fi/research/ouspg/pr … 0/archive/</a><br />Apparently this was all started by a a college research paper that displays the POTENTIAL to exploit many archive programs like 7zip and many others.</p><p>i wish to publicly apologize, and withdraw the word &#039;rumor&#039;. Since it is actually based on a published Thesis paper at a University.</p><p>that just leaves us with unsubstantiated&nbsp; <img src="http://forum.driverpacks.net/img/smilies/smile.png" width="15" height="15" alt="smile" />&nbsp; <img src="http://forum.driverpacks.net/img/smilies/tongue.png" width="15" height="15" alt="tongue" />&nbsp; LOL (Show me a link to a SARC report or similar)</p><p>Don&#039;t ever hesitate to post a &#039;heads up&#039; to a problem we may have - or potentialy could have. <br />We do want to know! </p><p><em>At this time</em> there is just nothing for us to worry about since no known exploits actually exist in the wild <img src="http://forum.driverpacks.net/img/smilies/big_smile.png" width="15" height="15" alt="big_smile" /><br />Once an exploit was exposed we could then evaluate any potential exposure from a bootable ROM (DVD) (probably NIL) <br />(it is usually at this point one of my fellow team members will shoot me down LOL)</p><p>I admire your persistence and professionalism Xabib... I hope we see more of you in the future~</p><p>Have a great day and please accept our warm welcome.</p>]]></content>
			<author>
				<name><![CDATA[OverFlow]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=1097</uri>
			</author>
			<updated>2009-04-21T23:49:46Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30948#p30948</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30938#p30938"/>
			<content type="html"><![CDATA[<p>yeah... we get reports every other month about Mute.exe too... <br />But it is the AV vendor(s) not the mute.exe app that is the problem <img src="http://forum.driverpacks.net/img/smilies/wink.png" width="15" height="15" alt="wink" /></p><p>usually it is AVG <br />(they are absolutely the worst AV - if your rating is based on the reporting of false positives)<br /> - if i had a dollar for every false positive reported here i would be rich <img src="http://forum.driverpacks.net/img/smilies/smile.png" width="15" height="15" alt="smile" /></p><p>Again, Thank YOU&nbsp; <br />It is better to be safe than sorry...</p>]]></content>
			<author>
				<name><![CDATA[OverFlow]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=1097</uri>
			</author>
			<updated>2009-04-21T17:42:51Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30938#p30938</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30937#p30937"/>
			<content type="html"><![CDATA[<p>Loud and clear <img src="http://forum.driverpacks.net/img/smilies/wink.png" width="15" height="15" alt="wink" /></p><p>We&#039;ll have to make an exception on our software detector.</p><p>Thanks, anyway.</p>]]></content>
			<author>
				<name><![CDATA[xabib]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=6641</uri>
			</author>
			<updated>2009-04-21T17:30:17Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30937#p30937</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30934#p30934"/>
			<content type="html"><![CDATA[<p>no offence taken... and many of our users are not native to English, I am used to that <img src="http://forum.driverpacks.net/img/smilies/wink.png" width="15" height="15" alt="wink" /></p><p>the thing is we don&#039;t have any bugs... <br />Because of our unique usage of the 7zip application we are not exposed now, <br />nor would we be exposed in the future to any potential exploit of 7zip<br /> - especially an unreported, unspecified or more likely a non existent one... </p><p>There is no benefit for us to update 7zip, and updating could cause issues with our apps. </p><p>Un7zip our custom app, is not distributed by 7zip.<br />and therefore is not nor would it be affected by your indicated reports... <br />(Un7zip is not a 7zip application - it is our own custom app) <br />Un7zip is extensively tested and known for a fact to be faster with the currently used 7zip dll... <br />I will not give that up without a valid reason.<br />No valid reason has been presented yet.</p><p>Since no info about the alleged exploit is available <br />it is most likely that it will not even affect our custom Un7zip app.<br />Upgrading will definitely increase the already lengthy extraction times during the DriverPacks installation.&nbsp; </p><p>We are glad you brought it to our attention! </p><p>But I see absolutely no reason to change anything... <br />At least not at this time... and certainly not based on unsubstantiated rumor.</p>]]></content>
			<author>
				<name><![CDATA[OverFlow]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=1097</uri>
			</author>
			<updated>2009-04-21T16:51:35Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30934#p30934</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30931#p30931"/>
			<content type="html"><![CDATA[<p>It has been submitted to the CVE less than a month ago, and thus it is still marked as &quot;Candidate&quot;. Of course, each company has their own policies regarding security. Secunia, which IS a reliable source of information, has been faster to declare it as a vulnerability, which is normal being an smaller private company. CVE, being a bigger and more &quot;formal&quot; (it is funded by Homeland Security), probably will take a little more time to declare it as a vulnerability, or not declare it at all.<br />However, i just reported it because it is EASY to change, and even if 7-zip has a vulnerability or not, there will be less chance of bugs using a newer version, than a 2 year old version (just see the changelog to see the number&nbsp; of bugfixes in the last 2 years).<br />And excuse me if i&#039;m being rude, im not a native speaker and sometimes i express myself in an unpolite way.<br />Cheers.</p>]]></content>
			<author>
				<name><![CDATA[xabib]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=6641</uri>
			</author>
			<updated>2009-04-21T15:43:51Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30931#p30931</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30930#p30930"/>
			<content type="html"><![CDATA[<p>from your link </p><p>This CVE Identifier has &quot;Candidate&quot; status and must be reviewed and accepted by the CVE Editorial Board before it can be updated to official &quot;Entry&quot; status on the CVE List. It may be modified or even rejected in the future.</p><p>It is not an official report.... &quot;it is only a candidate and may be removed&quot;</p><p>YOU have Still NOT provided any reliable source that indicates any problem at all, of anything at all...</p><p>not only is it not a serious vunerability... there is in fact no evidence of a vunerability at all...</p>]]></content>
			<author>
				<name><![CDATA[OverFlow]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=1097</uri>
			</author>
			<updated>2009-04-21T15:19:50Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30930#p30930</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30928#p30928"/>
			<content type="html"><![CDATA[<p>There is more informations on the links in the page below:</p><p><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6536">http://cve.mitre.org/cgi-bin/cvename.cg … -2008-6536</a></p><p>The point is, it is a simple fix (no change to source code, just replacin the executables), and the more closed doors, the better. It probably isn&#039;t a serious vulnerability, and in the scope it is used in the program is almost imposible to reproduce. Just reporting, if you want you could upgrade it. We use a tool in our office that tells us when there&#039;s any software that has a vulnerability reported, and that&#039;s why I reported. I&#039;ve already fixed it in my machine (replacing the exe and dll from 7 zip, but I thought it could help others with similar tools, and using your software.</p><p>Salutes!</p>]]></content>
			<author>
				<name><![CDATA[xabib]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=6641</uri>
			</author>
			<updated>2009-04-21T12:01:26Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30928#p30928</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: 7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30926#p30926"/>
			<content type="html"><![CDATA[<p>Um an unsubstantiated claim with zero details about the Supposed exploit, name of offending code, payload, distribution&nbsp; statistics, Removal instructions for said exploit, ect... by an AV company that is not in a top five list, carries little weight here..</p><p>Espacialy when the title of said report is &quot;7-zip Unspecified Vulnerability&quot;. That is just a little to vague to inspire action...</p><p>Our usage with the DriverPacks is during an install from a read only media before any network conections would possably be made.</p><p>Zero exposure... (to a problem that seemingly doesn&#039;t exist anyway) Think about it for a minute...</p>]]></content>
			<author>
				<name><![CDATA[OverFlow]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=1097</uri>
			</author>
			<updated>2009-04-21T09:21:46Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30926#p30926</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[7z vulnerabilty]]></title>
			<link rel="alternate" href="http://forum.driverpacks.net/viewtopic.php?pid=30924#p30924"/>
			<content type="html"><![CDATA[<p>The version of 7z you use has a known vulnerability. </p><p><a href="http://secunia.com/advisories/29434/">http://secunia.com/advisories/29434/</a> </p><p>Please upgrade your version to the latest one.</p><p>Great program, keep the good work!</p>]]></content>
			<author>
				<name><![CDATA[xabib]]></name>
				<uri>http://forum.driverpacks.net/profile.php?id=6641</uri>
			</author>
			<updated>2009-04-21T08:42:13Z</updated>
			<id>http://forum.driverpacks.net/viewtopic.php?pid=30924#p30924</id>
		</entry>
</feed>
