Vulnerabilites related to rahul_dhesi - zoo
Vulnerability from fkie_nvd
Published
2006-03-19 02:02
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rahul_dhesi | zoo | 2.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rahul_dhesi:zoo:2.10:*:*:*:*:*:*:*", matchCriteriaId: "CC1857FC-C6A7-458F-A293-57BA9FC4ECA5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.", }, ], id: "CVE-2006-1269", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2006-03-19T02:02:00.000", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/19250", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/19254", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/17126", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2006/0969", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/19250", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19254", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/17126", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/0969", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*", matchCriteriaId: "64AF6FAE-B025-4F70-9F52-C7C12C6F705D", versionEndIncluding: "2.4.1", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus:*:*:*:*:*:*:*:*", matchCriteriaId: "6AC3BF13-2946-411E-93A5-0C3AF0508C60", versionEndIncluding: "4.7.980", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus:4.6.394:*:*:*:*:*:*:*", matchCriteriaId: "8683D747-C092-4841-AABF-280D7EB771F0", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus:4.7.652:*:*:*:*:*:*:*", matchCriteriaId: "D393356E-0464-41B6-9D56-2DCFC6900244", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus:4.7.700:*:*:*:*:*:*:*", matchCriteriaId: "0ED7C89E-E28B-4BE9-952D-86A8D089B41D", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.0:*:*:*:*:*:*:*", matchCriteriaId: "1519A450-8F71-408A-81B8-AA6F337E7A25", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6:*:*:*:*:*:*:*", matchCriteriaId: "48872452-2B26-44C4-A9FF-0D9D23AAC95A", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.652:*:*:*:*:*:*:*", matchCriteriaId: "275D7948-61FB-4415-A9EB-59EEF9757149", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.655:*:*:*:*:*:*:*", matchCriteriaId: "5CCC4081-D877-4DE3-9342-59BCE7C41CE2", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.665:*:*:*:*:*:*:*", matchCriteriaId: "B189DFCB-2307-43B4-8102-BA725CEE0711", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.691:*:*:*:*:*:*:*", matchCriteriaId: "3C733E69-33B3-465B-B146-A68C26373E00", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:*:*:*:*:*:*", matchCriteriaId: "2EF16A3D-BC29-4426-BDF5-F1C6E85228B0", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*", matchCriteriaId: "33A71A2C-36AC-4F36-9D94-AA824F4DE14C", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:*:*:*:*:*:*", matchCriteriaId: "E02983BB-F027-4967-A230-933299D2D061", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*", matchCriteriaId: "62618C12-3EAC-4434-B2A8-D83612F1A05C", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:*:*:*:*:*:*", matchCriteriaId: "238FB2B1-41CF-46DB-8ED7-7F2B6609C27D", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*", matchCriteriaId: "B949535B-9771-4AC6-BBDB-8BB3A789A1FA", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:*:*:*:*:*:*", matchCriteriaId: "97FEA351-FFF6-4452-9A2B-A7AAF4D7EE20", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*", matchCriteriaId: "DC6DA89A-BF71-4031-9B51-E5941FDE5E15", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:*:*:*:*:*:*", matchCriteriaId: "18837F1C-8ECD-4202-9489-08D63FB28CDB", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*", matchCriteriaId: "DB201D49-EB74-4A5D-B641-86C4429E3EC0", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.0:*:*:*:*:*:*:*", matchCriteriaId: "231DDF5E-5026-4844-8374-45F0926F8C4F", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6:*:*:*:*:*:*:*", matchCriteriaId: "8822D55C-FEE7-41B5-A8D5-8D9F514CF815", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.603:*:*:*:*:*:*:*", matchCriteriaId: "B89C0CA4-00DE-4CAD-B554-36C46815A919", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.652:*:*:*:*:*:*:*", matchCriteriaId: "A618B922-80E7-4769-90BA-5FE231DA6B89", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.665:*:*:*:*:*:*:*", matchCriteriaId: "40F19B83-BAD9-4CDC-95C5-6D352F223AA9", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.691:*:*:*:*:*:*:*", matchCriteriaId: "762B6C23-5ADD-4221-8146-DF9CE95637BB", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:*:*:*:*:*:*", matchCriteriaId: "2F3B1651-DC3E-43B8-A5A4-8BEF7D668EEC", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*", matchCriteriaId: "DF2D8C10-01E4-43D7-93EE-342BA7E9C489", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:*:*:*:*:*:*", matchCriteriaId: "3D0980CA-26A4-468E-82F3-E03953250343", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*", matchCriteriaId: "AAB7888A-E884-4C73-AF10-698C56E080F3", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.869:*:*:*:*:*:*:*", matchCriteriaId: "FF5B2325-D8EE-4D1E-8291-740726FC1EF6", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:*:*:*:*:*:*", matchCriteriaId: "FB0EF168-1F0D-4772-8922-0A75CAF28661", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*", matchCriteriaId: "1F7F2957-4422-4891-B573-F68882D7C8E1", vulnerable: true, }, { criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:*:*:*:*:*:*", matchCriteriaId: "5CAED694-2497-488B-A2AB-0781501678F4", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir:*:*:*:*:*:*:*:*", matchCriteriaId: "FDD00670-7EC0-4AA4-98EF-C8AE38330284", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*", matchCriteriaId: "C23C179C-B50E-4F47-BFFA-85848131C99D", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir:7.04.00.23:*:*:*:*:*:*:*", matchCriteriaId: "5C813AD8-5D73-41DF-B710-3CEB20FB9EF2", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", matchCriteriaId: "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*", matchCriteriaId: "5DB520B5-36E8-4F4B-99FF-0FF3F708CC8A", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*", matchCriteriaId: "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*", matchCriteriaId: "CD267D52-D580-4460-AFF9-E5BA478A98FA", versionEndIncluding: "7.3.0.5", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir_personal:7:*:*:*:*:*:*:*", matchCriteriaId: "64D94528-A54F-439B-8584-57A82CDF7318", vulnerable: true, }, { criteria: "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*", matchCriteriaId: "DB66A5A4-6758-438D-9155-7475A5406DA5", vulnerable: true, }, { criteria: "cpe:2.3:a:panda:panda_antivirus:2007:*:*:*:*:*:*:*", matchCriteriaId: "A9F9AF4F-E974-4D6F-AF51-0DA7A59E64FD", vulnerable: true, }, { criteria: "cpe:2.3:a:panda:panda_antivirus_and_firewall:2007:*:*:*:*:*:*:*", matchCriteriaId: "C4DBEED1-0648-45F3-AFC2-91C872A1B098", vulnerable: true, }, { criteria: "cpe:2.3:a:picozip:picozip:*:*:*:*:*:*:*:*", matchCriteriaId: "6AD36471-D8DC-4B11-B53B-264AB1560063", vulnerable: true, }, { criteria: "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*", matchCriteriaId: "79845C9F-7884-4F77-B492-4A944D3DCCEA", versionEndIncluding: "2.10", vulnerable: true, }, { criteria: "cpe:2.3:a:unzoo:unzoo:4.4:*:*:*:*:*:*:*", matchCriteriaId: "B93C2E82-03E5-42CE-A589-B82FBCBE7D52", vulnerable: true, }, { criteria: "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*", matchCriteriaId: "BF7B6EE8-25D5-4C89-A0B8-A069D330A9D9", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*", matchCriteriaId: "0D03D666-D234-4626-82F9-EC5726BE1920", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_100:*:*:*:*:*:*:*", matchCriteriaId: "D0BEEFB2-C6ED-43D5-B535-623931C38890", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_200:*:*:*:*:*:*:*", matchCriteriaId: "C2ECF7F8-A29F-4868-9DE5-4227E5DA2285", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_300:*:*:*:*:*:*:*", matchCriteriaId: "6A897043-9003-4F27-8C7D-AE6B2BD0389C", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_400:*:*:*:*:*:*:*", matchCriteriaId: "1F05FEF8-6B34-4874-AD6B-A053415BD939", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_500:*:*:*:*:*:*:*", matchCriteriaId: "D28FAD61-3723-4CCC-B890-C5869E7AC3EB", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_600:*:*:*:*:*:*:*", matchCriteriaId: "7697AAC2-EC8A-496E-9336-29AAE61CD69E", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_800:*:*:*:*:*:*:*", matchCriteriaId: "BAA47F3A-44BA-4011-8A44-1AE54D02E772", vulnerable: true, }, { criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_900:*:*:*:*:*:*:*", matchCriteriaId: "423620AD-EA6A-4730-B97A-DF67247372BE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.", }, { lang: "es", value: "El archivo unzoo.c, tal como se utiliza en varios productos, incluyendo AMaViS versión 2.4.1 y anteriores, permite a los atacantes remotos causar una denegación de servicio (bucle infinito) por medio de un archivo ZOO con una estructura direntry que apunta hacia un archivo anterior.", }, ], evaluatorSolution: "http://xforce.iss.net/xforce/xfdb/34080\r\n\r\n\r\nFor Barracuda Spam Firewall:\r\nUpgrade to the latest virus definition version of Barracuda Spam Firewall (virusdef 2.0.6399 for 3.4 and after or virusdef 2.0.6399o for prior to 3.4), available from the automatic update.\r\n\r\nFor Panda Software Antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4/2/2007 or later), available from the automatic update feature.\r\n\r\nFor avast! antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4.7.981 or later), available from the avast! antivirus Web site. See references.\r\n\r\nFor Avira AntiVir:\r\nUpgrade to the latest version of Avira AntiVir (avpack32.dll version 7.3.0.6 or later), available from the automatic update feature.\r\n\r\nFor AMaViS:\r\nRefer to ASA-2007-2 for patch, upgrade, or suggested workaround information. See References.", id: "CVE-2007-1673", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-05-09T01:19:00.000", references: [ { source: "cve@mitre.org", url: "http://osvdb.org/36208", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/25315", }, { source: "cve@mitre.org", url: "http://securityreason.com/securityalert/2680", }, { source: "cve@mitre.org", url: "http://www.amavis.org/security/asa-2007-2.txt", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.securityfocus.com/bid/23823", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/36208", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/25315", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securityreason.com/securityalert/2680", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.amavis.org/security/asa-2007-2.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.securityfocus.com/bid/23823", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-02-23 21:02
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rahul_dhesi | zoo | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*", matchCriteriaId: "79845C9F-7884-4F77-B492-4A944D3DCCEA", versionEndIncluding: "2.10", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.", }, ], id: "CVE-2006-0855", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: true, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2006-02-23T21:02:00.000", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19002", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19130", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19148", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/19166", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19408", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/19514", }, { source: "cve@mitre.org", url: "http://securityreason.com/securityalert/546", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1015668", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://securitytracker.com/id?1015866", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-991", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml", }, { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "http://www.guay-leroux.com/projects/zoo-advisory.txt", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/16790", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2006/0705", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2006/1220", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19130", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19148", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/19166", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/19408", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/19514", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securityreason.com/securityalert/546", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1015668", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://securitytracker.com/id?1015866", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-991", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "http://www.guay-leroux.com/projects/zoo-advisory.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/16790", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2006/0705", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2006/1220", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
CVE-2006-1269 (GCVE-0-2006-1269)
Vulnerability from cvelistv5
Published
2006-03-19 02:00
Modified
2024-08-07 17:03
Severity ?
EPSS score ?
Summary
Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/17126 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426 | x_refsource_MISC | |
http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25264 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2006/0969 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/19254 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/19250 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T17:03:28.767Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "17126", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/17126", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426", }, { name: "GLSA-200603-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml", }, { name: "zoo-parse-bo(25264)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264", }, { name: "ADV-2006-0969", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/0969", }, { name: "19254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19254", }, { name: "19250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19250", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-03-16T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-19T15:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "17126", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/17126", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426", }, { name: "GLSA-200603-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml", }, { name: "zoo-parse-bo(25264)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264", }, { name: "ADV-2006-0969", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/0969", }, { name: "19254", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19254", }, { name: "19250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19250", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-1269", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "17126", refsource: "BID", url: "http://www.securityfocus.com/bid/17126", }, { name: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426", refsource: "MISC", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426", }, { name: "GLSA-200603-12", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml", }, { name: "zoo-parse-bo(25264)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264", }, { name: "ADV-2006-0969", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/0969", }, { name: "19254", refsource: "SECUNIA", url: "http://secunia.com/advisories/19254", }, { name: "19250", refsource: "SECUNIA", url: "http://secunia.com/advisories/19250", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-1269", datePublished: "2006-03-19T02:00:00", dateReserved: "2006-03-18T00:00:00", dateUpdated: "2024-08-07T17:03:28.767Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-1673 (GCVE-0-2007-1673)
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:06
Severity ?
EPSS score ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
▼ | URL | Tags |
---|---|---|
http://www.amavis.org/security/asa-2007-2.txt | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080 | vdb-entry, x_refsource_XF | |
http://osvdb.org/36208 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/23823 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/25315 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/467646/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/2680 | third-party-advisory, x_refsource_SREASON |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T13:06:25.976Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.amavis.org/security/asa-2007-2.txt", }, { name: "multiple-vendor-zoo-dos(34080)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080", }, { name: "36208", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/36208", }, { name: "23823", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23823", }, { name: "25315", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25315", }, { name: "20070504 Multiple vendors ZOO file decompression infinite loop DoS", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded", }, { name: "2680", tags: [ "third-party-advisory", "x_refsource_SREASON", "x_transferred", ], url: "http://securityreason.com/securityalert/2680", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-04-07T00:00:00", descriptions: [ { lang: "en", value: "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-16T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.amavis.org/security/asa-2007-2.txt", }, { name: "multiple-vendor-zoo-dos(34080)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080", }, { name: "36208", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/36208", }, { name: "23823", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23823", }, { name: "25315", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25315", }, { name: "20070504 Multiple vendors ZOO file decompression infinite loop DoS", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded", }, { name: "2680", tags: [ "third-party-advisory", "x_refsource_SREASON", ], url: "http://securityreason.com/securityalert/2680", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-1673", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.amavis.org/security/asa-2007-2.txt", refsource: "CONFIRM", url: "http://www.amavis.org/security/asa-2007-2.txt", }, { name: "multiple-vendor-zoo-dos(34080)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080", }, { name: "36208", refsource: "OSVDB", url: "http://osvdb.org/36208", }, { name: "23823", refsource: "BID", url: "http://www.securityfocus.com/bid/23823", }, { name: "25315", refsource: "SECUNIA", url: "http://secunia.com/advisories/25315", }, { name: "20070504 Multiple vendors ZOO file decompression infinite loop DoS", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded", }, { name: "2680", refsource: "SREASON", url: "http://securityreason.com/securityalert/2680", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-1673", datePublished: "2007-05-09T01:00:00", dateReserved: "2007-03-24T00:00:00", dateUpdated: "2024-08-07T13:06:25.976Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-0855 (GCVE-0-2006-0855)
Vulnerability from cvelistv5
Published
2006-02-23 21:00
Modified
2024-08-07 16:48
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T16:48:56.934Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1015866", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1015866", }, { name: "19408", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19408", }, { name: "SUSE-SR:2006:005", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html", }, { name: "19166", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19166", }, { name: "SUSE-SR:2006:006", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html", }, { name: "ADV-2006-1220", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/1220", }, { name: "19514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19514", }, { name: "546", tags: [ "third-party-advisory", "x_refsource_SREASON", "x_transferred", ], url: "http://securityreason.com/securityalert/546", }, { name: "GLSA-200603-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml", }, { name: "1015668", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1015668", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt", }, { name: "19130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19130", }, { name: "zoo-misc-bo(24904)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904", }, { name: "ADV-2006-0705", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/0705", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.guay-leroux.com/projects/zoo-advisory.txt", }, { name: "DSA-991", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-991", }, { name: "20060403 Barracuda ZOO archiver security bug leads to remote compromise", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html", }, { name: "20060223 zoo contains exploitable buffer overflows", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded", }, { name: "19002", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19002", }, { name: "19148", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19148", }, { name: "16790", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/16790", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-02-23T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-18T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1015866", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1015866", }, { name: "19408", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19408", }, { name: "SUSE-SR:2006:005", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html", }, { name: "19166", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19166", }, { name: "SUSE-SR:2006:006", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html", }, { name: "ADV-2006-1220", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/1220", }, { name: "19514", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19514", }, { name: "546", tags: [ "third-party-advisory", "x_refsource_SREASON", ], url: "http://securityreason.com/securityalert/546", }, { name: "GLSA-200603-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml", }, { name: "1015668", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1015668", }, { tags: [ "x_refsource_MISC", ], url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt", }, { name: "19130", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19130", }, { name: "zoo-misc-bo(24904)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904", }, { name: "ADV-2006-0705", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/0705", }, { tags: [ "x_refsource_MISC", ], url: "http://www.guay-leroux.com/projects/zoo-advisory.txt", }, { name: "DSA-991", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-991", }, { name: "20060403 Barracuda ZOO archiver security bug leads to remote compromise", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html", }, { name: "20060223 zoo contains exploitable buffer overflows", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded", }, { name: "19002", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19002", }, { name: "19148", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19148", }, { name: "16790", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/16790", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-0855", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1015866", refsource: "SECTRACK", url: "http://securitytracker.com/id?1015866", }, { name: "19408", refsource: "SECUNIA", url: "http://secunia.com/advisories/19408", }, { name: "SUSE-SR:2006:005", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html", }, { name: "19166", refsource: "SECUNIA", url: "http://secunia.com/advisories/19166", }, { name: "SUSE-SR:2006:006", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html", }, { name: "ADV-2006-1220", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/1220", }, { name: "19514", refsource: "SECUNIA", url: "http://secunia.com/advisories/19514", }, { name: "546", refsource: "SREASON", url: "http://securityreason.com/securityalert/546", }, { name: "GLSA-200603-05", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml", }, { name: "1015668", refsource: "SECTRACK", url: "http://securitytracker.com/id?1015668", }, { name: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt", refsource: "MISC", url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt", }, { name: "19130", refsource: "SECUNIA", url: "http://secunia.com/advisories/19130", }, { name: "zoo-misc-bo(24904)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904", }, { name: "ADV-2006-0705", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/0705", }, { name: "http://www.guay-leroux.com/projects/zoo-advisory.txt", refsource: "MISC", url: "http://www.guay-leroux.com/projects/zoo-advisory.txt", }, { name: "DSA-991", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-991", }, { name: "20060403 Barracuda ZOO archiver security bug leads to remote compromise", refsource: "BUGTRAQ", url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html", }, { name: "20060223 zoo contains exploitable buffer overflows", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded", }, { name: "19002", refsource: "SECUNIA", url: "http://secunia.com/advisories/19002", }, { name: "19148", refsource: "SECUNIA", url: "http://secunia.com/advisories/19148", }, { name: "16790", refsource: "BID", url: "http://www.securityfocus.com/bid/16790", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-0855", datePublished: "2006-02-23T21:00:00", dateReserved: "2006-02-23T00:00:00", dateUpdated: "2024-08-07T16:48:56.934Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }