Tan Chew Keong has reported a vulnerability in Turbo Searcher, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the 7-Zip ARJ plugin when processing an archive with an overly large ARJ block. This can be exploited to cause a stack-based buffer overflow when performing a search in a directory containing a specially crafted ARJ archive.
Successful exploitation requires that the "Quick Search" option is disabled and the "Search in compressed file" option is enabled.
The vulnerability is reported in the following versions:
* Turbo Searcher Standard Edition v3.30
* Turbo Searcher Network Edition v3.30
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org