WinZip 8.0 uses weak random number generation for password protected ZIP files, which allows local users to brute force the encryption keys and extract the data from the zip file by guessing the state of the stream coder.
                
            References
                    Configurations
                    History
                    20 Nov 2024, 23:46
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://securityreason.com/securityalert/3265 - | |
| References | () http://www.securityfocus.com/archive/1/311059 - Exploit | |
| References | () http://www.securityfocus.com/bid/6805 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11296 - | 
Information
                Published : 2003-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-1376
Mitre link : CVE-2003-1376
CVE.ORG link : CVE-2003-1376
JSON object : View
Products Affected
                winzip
- winzip
CWE
                
                    
                        
                        CWE-255
                        
            Credentials Management Errors
