CVE-2008-4779
Tguzip - Memory Corruption
Title source: ruleDescription
Stack-based buffer overflow in TUGzip 3.5.0.0 allows remote attackers to denial of service (crash) or execute arbitrary code via a long filename in a .zip file.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/17967
exploitdb
WORKING POC
VERIFIED
by Lincoln · perllocalwindows
https://www.exploit-db.com/exploits/12008
exploitdb
WORKING POC
VERIFIED
by fl0 fl0w · c++localwindows
https://www.exploit-db.com/exploits/6831
metasploit
WORKING POC
GOOD
by Stefan Marin, Lincoln · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/tugzip.rb
References (6)
Scores
EPSS
0.7879
EPSS Percentile
99.1%
Details
CWE
CWE-119
Status
published
Products (1)
tguzip/tguzip
3.5.5.0.0
Published
Oct 29, 2008
Tracked Since
Feb 18, 2026