Vulnerabilites related to rahul_dhesi - zoo
Vulnerability from fkie_nvd
Published
2006-03-19 02:02
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.
Impacted products
Vendor Product Version
rahul_dhesi zoo 2.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:rahul_dhesi:zoo:2.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1857FC-C6A7-458F-A293-57BA9FC4ECA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation.  NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.",
      },
   ],
   id: "CVE-2006-1269",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-03-19T02:02:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19250",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/19254",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/17126",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2006/0969",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19250",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/19254",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/17126",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/0969",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-05-09 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
Impacted products
Vendor Product Version
amavis amavis *
avast avast_antivirus *
avast avast_antivirus 4.6.394
avast avast_antivirus 4.7.652
avast avast_antivirus 4.7.700
avast avast_antivirus_home 4.0
avast avast_antivirus_home 4.6
avast avast_antivirus_home 4.6.652
avast avast_antivirus_home 4.6.655
avast avast_antivirus_home 4.6.665
avast avast_antivirus_home 4.6.691
avast avast_antivirus_home 4.7.827
avast avast_antivirus_home 4.7.827
avast avast_antivirus_home 4.7.844
avast avast_antivirus_home 4.7.844
avast avast_antivirus_home 4.7.869
avast avast_antivirus_home 4.7.869
avast avast_antivirus_home 4.7.1043
avast avast_antivirus_home 4.7.1043
avast avast_antivirus_home 4.7.1098
avast avast_antivirus_home 4.7.1098
avast avast_antivirus_professional 4.0
avast avast_antivirus_professional 4.6
avast avast_antivirus_professional 4.6.603
avast avast_antivirus_professional 4.6.652
avast avast_antivirus_professional 4.6.665
avast avast_antivirus_professional 4.6.691
avast avast_antivirus_professional 4.7.827
avast avast_antivirus_professional 4.7.827
avast avast_antivirus_professional 4.7.844
avast avast_antivirus_professional 4.7.844
avast avast_antivirus_professional 4.7.869
avast avast_antivirus_professional 4.7.1043
avast avast_antivirus_professional 4.7.1043
avast avast_antivirus_professional 4.7.1098
avira antivir *
avira antivir 6.35.00.00
avira antivir 7.04.00.23
avira antivir_personal *
avira antivir_personal *
avira antivir_personal *
avira antivir_personal *
avira antivir_personal 7
avira antivir_personal 7
panda panda_antivirus 2007
panda panda_antivirus_and_firewall 2007
picozip picozip *
rahul_dhesi zoo *
unzoo unzoo 4.4
winace winace *
barracuda_networks barracuda_spam_firewall *
barracuda_networks barracuda_spam_firewall model_100
barracuda_networks barracuda_spam_firewall model_200
barracuda_networks barracuda_spam_firewall model_300
barracuda_networks barracuda_spam_firewall model_400
barracuda_networks barracuda_spam_firewall model_500
barracuda_networks barracuda_spam_firewall model_600
barracuda_networks barracuda_spam_firewall model_800
barracuda_networks barracuda_spam_firewall model_900



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amavis:amavis:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "64AF6FAE-B025-4F70-9F52-C7C12C6F705D",
                     versionEndIncluding: "2.4.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC3BF13-2946-411E-93A5-0C3AF0508C60",
                     versionEndIncluding: "4.7.980",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus:4.6.394:*:*:*:*:*:*:*",
                     matchCriteriaId: "8683D747-C092-4841-AABF-280D7EB771F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus:4.7.652:*:*:*:*:*:*:*",
                     matchCriteriaId: "D393356E-0464-41B6-9D56-2DCFC6900244",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus:4.7.700:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED7C89E-E28B-4BE9-952D-86A8D089B41D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1519A450-8F71-408A-81B8-AA6F337E7A25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "48872452-2B26-44C4-A9FF-0D9D23AAC95A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.652:*:*:*:*:*:*:*",
                     matchCriteriaId: "275D7948-61FB-4415-A9EB-59EEF9757149",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.655:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CCC4081-D877-4DE3-9342-59BCE7C41CE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.665:*:*:*:*:*:*:*",
                     matchCriteriaId: "B189DFCB-2307-43B4-8102-BA725CEE0711",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.6.691:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C733E69-33B3-465B-B146-A68C26373E00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EF16A3D-BC29-4426-BDF5-F1C6E85228B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*",
                     matchCriteriaId: "33A71A2C-36AC-4F36-9D94-AA824F4DE14C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:*:*:*:*:*:*",
                     matchCriteriaId: "E02983BB-F027-4967-A230-933299D2D061",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*",
                     matchCriteriaId: "62618C12-3EAC-4434-B2A8-D83612F1A05C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:*:*:*:*:*:*",
                     matchCriteriaId: "238FB2B1-41CF-46DB-8ED7-7F2B6609C27D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*",
                     matchCriteriaId: "B949535B-9771-4AC6-BBDB-8BB3A789A1FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:*:*:*:*:*:*",
                     matchCriteriaId: "97FEA351-FFF6-4452-9A2B-A7AAF4D7EE20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*",
                     matchCriteriaId: "DC6DA89A-BF71-4031-9B51-E5941FDE5E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:*:*:*:*:*:*",
                     matchCriteriaId: "18837F1C-8ECD-4202-9489-08D63FB28CDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*",
                     matchCriteriaId: "DB201D49-EB74-4A5D-B641-86C4429E3EC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "231DDF5E-5026-4844-8374-45F0926F8C4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "8822D55C-FEE7-41B5-A8D5-8D9F514CF815",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.603:*:*:*:*:*:*:*",
                     matchCriteriaId: "B89C0CA4-00DE-4CAD-B554-36C46815A919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.652:*:*:*:*:*:*:*",
                     matchCriteriaId: "A618B922-80E7-4769-90BA-5FE231DA6B89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.665:*:*:*:*:*:*:*",
                     matchCriteriaId: "40F19B83-BAD9-4CDC-95C5-6D352F223AA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.6.691:*:*:*:*:*:*:*",
                     matchCriteriaId: "762B6C23-5ADD-4221-8146-DF9CE95637BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F3B1651-DC3E-43B8-A5A4-8BEF7D668EEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*",
                     matchCriteriaId: "DF2D8C10-01E4-43D7-93EE-342BA7E9C489",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D0980CA-26A4-468E-82F3-E03953250343",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*",
                     matchCriteriaId: "AAB7888A-E884-4C73-AF10-698C56E080F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.869:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF5B2325-D8EE-4D1E-8291-740726FC1EF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0EF168-1F0D-4772-8922-0A75CAF28661",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*",
                     matchCriteriaId: "1F7F2957-4422-4891-B573-F68882D7C8E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CAED694-2497-488B-A2AB-0781501678F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDD00670-7EC0-4AA4-98EF-C8AE38330284",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir:6.35.00.00:*:*:*:*:*:*:*",
                     matchCriteriaId: "C23C179C-B50E-4F47-BFFA-85848131C99D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir:7.04.00.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C813AD8-5D73-41DF-B710-3CEB20FB9EF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B38A75AF-D8B4-4B54-87E9-6EED562CAAC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir_personal:*:*:classic:*:*:*:*:*",
                     matchCriteriaId: "5DB520B5-36E8-4F4B-99FF-0FF3F708CC8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir_personal:*:*:premium:*:*:*:*:*",
                     matchCriteriaId: "BECD1C6B-EC0F-4203-BA12-F8B02472FF4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir_personal:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD267D52-D580-4460-AFF9-E5BA478A98FA",
                     versionEndIncluding: "7.3.0.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir_personal:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "64D94528-A54F-439B-8584-57A82CDF7318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avira:antivir_personal:7:*:classic:*:*:*:*:*",
                     matchCriteriaId: "DB66A5A4-6758-438D-9155-7475A5406DA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:panda:panda_antivirus:2007:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9F9AF4F-E974-4D6F-AF51-0DA7A59E64FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:panda:panda_antivirus_and_firewall:2007:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4DBEED1-0648-45F3-AFC2-91C872A1B098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:picozip:picozip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD36471-D8DC-4B11-B53B-264AB1560063",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "79845C9F-7884-4F77-B492-4A944D3DCCEA",
                     versionEndIncluding: "2.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:unzoo:unzoo:4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B93C2E82-03E5-42CE-A589-B82FBCBE7D52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:winace:winace:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF7B6EE8-25D5-4C89-A0B8-A069D330A9D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D03D666-D234-4626-82F9-EC5726BE1920",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_100:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0BEEFB2-C6ED-43D5-B535-623931C38890",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_200:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2ECF7F8-A29F-4868-9DE5-4227E5DA2285",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_300:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A897043-9003-4F27-8C7D-AE6B2BD0389C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_400:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F05FEF8-6B34-4874-AD6B-A053415BD939",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_500:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28FAD61-3723-4CCC-B890-C5869E7AC3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_600:*:*:*:*:*:*:*",
                     matchCriteriaId: "7697AAC2-EC8A-496E-9336-29AAE61CD69E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_800:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAA47F3A-44BA-4011-8A44-1AE54D02E772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:barracuda_networks:barracuda_spam_firewall:model_900:*:*:*:*:*:*:*",
                     matchCriteriaId: "423620AD-EA6A-4730-B97A-DF67247372BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.",
      },
      {
         lang: "es",
         value: "El archivo unzoo.c, tal como se utiliza en varios productos, incluyendo AMaViS versión 2.4.1 y anteriores, permite a los atacantes remotos causar una denegación de servicio (bucle infinito) por medio de un archivo ZOO con una estructura direntry que apunta hacia un archivo anterior.",
      },
   ],
   evaluatorSolution: "http://xforce.iss.net/xforce/xfdb/34080\r\n\r\n\r\nFor Barracuda Spam Firewall:\r\nUpgrade to the latest virus definition version of Barracuda Spam Firewall (virusdef 2.0.6399 for 3.4 and after or virusdef 2.0.6399o for prior to 3.4), available from the automatic update.\r\n\r\nFor Panda Software Antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4/2/2007 or later), available from the automatic update feature.\r\n\r\nFor avast! antivirus:\r\nUpgrade to the latest version of Panda Software Antivirus (4.7.981 or later), available from the avast! antivirus Web site. See references.\r\n\r\nFor Avira AntiVir:\r\nUpgrade to the latest version of Avira AntiVir (avpack32.dll version 7.3.0.6 or later), available from the automatic update feature.\r\n\r\nFor AMaViS:\r\nRefer to ASA-2007-2 for patch, upgrade, or suggested workaround information. See References.",
   id: "CVE-2007-1673",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-05-09T01:19:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://osvdb.org/36208",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/25315",
      },
      {
         source: "cve@mitre.org",
         url: "http://securityreason.com/securityalert/2680",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.amavis.org/security/asa-2007-2.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/23823",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/36208",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/25315",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securityreason.com/securityalert/2680",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.amavis.org/security/asa-2007-2.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/23823",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-02-23 21:02
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2006-04/0061.htmlExploit, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19002Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19130Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19148Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19166Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19408Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19514Patch, Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/546
cve@mitre.orghttp://securitytracker.com/id?1015668
cve@mitre.orghttp://securitytracker.com/id?1015866Patch
cve@mitre.orghttp://www.debian.org/security/2006/dsa-991Patch, Vendor Advisory
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200603-05.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txtExploit, Vendor Advisory
cve@mitre.orghttp://www.guay-leroux.com/projects/zoo-advisory.txtExploit, Vendor Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_05_sr.htmlVendor Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_06_sr.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/425887/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/16790
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/0705Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1220Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/24904
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.htmlExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19002Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19130Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19148Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19166Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19408Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19514Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/546
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015668
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015866Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-991Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200603-05.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txtExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.guay-leroux.com/projects/zoo-advisory.txtExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_05_sr.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_06_sr.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/425887/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16790
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0705Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1220Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24904
Impacted products
Vendor Product Version
rahul_dhesi zoo *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:rahul_dhesi:zoo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "79845C9F-7884-4F77-B492-4A944D3DCCEA",
                     versionEndIncluding: "2.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.",
      },
   ],
   id: "CVE-2006-0855",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 4.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2006-02-23T21:02:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19002",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19130",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19148",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19166",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19408",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19514",
      },
      {
         source: "cve@mitre.org",
         url: "http://securityreason.com/securityalert/546",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1015668",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://securitytracker.com/id?1015866",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-991",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.guay-leroux.com/projects/zoo-advisory.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/16790",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2006/0705",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2006/1220",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19130",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19148",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19166",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19408",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/19514",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securityreason.com/securityalert/546",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1015668",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://securitytracker.com/id?1015866",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.debian.org/security/2006/dsa-991",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Vendor Advisory",
         ],
         url: "http://www.guay-leroux.com/projects/zoo-advisory.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/16790",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2006/0705",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2006/1220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

CVE-2006-1269 (GCVE-0-2006-1269)
Vulnerability from cvelistv5
Published
2006-03-19 02:00
Modified
2024-08-07 17:03
Severity ?
Summary
Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.
References
http://www.securityfocus.com/bid/17126vdb-entry, x_refsource_BID
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426x_refsource_MISC
http://www.gentoo.org/security/en/glsa/glsa-200603-12.xmlvendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/25264vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/0969vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/19254third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19250third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T17:03:28.767Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "17126",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/17126",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426",
               },
               {
                  name: "GLSA-200603-12",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml",
               },
               {
                  name: "zoo-parse-bo(25264)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264",
               },
               {
                  name: "ADV-2006-0969",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/0969",
               },
               {
                  name: "19254",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19254",
               },
               {
                  name: "19250",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19250",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-03-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation.  NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-19T15:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "17126",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/17126",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426",
            },
            {
               name: "GLSA-200603-12",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml",
            },
            {
               name: "zoo-parse-bo(25264)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264",
            },
            {
               name: "ADV-2006-0969",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/0969",
            },
            {
               name: "19254",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19254",
            },
            {
               name: "19250",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19250",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-1269",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation.  NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "17126",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/17126",
                  },
                  {
                     name: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426",
                     refsource: "MISC",
                     url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426",
                  },
                  {
                     name: "GLSA-200603-12",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml",
                  },
                  {
                     name: "zoo-parse-bo(25264)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25264",
                  },
                  {
                     name: "ADV-2006-0969",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/0969",
                  },
                  {
                     name: "19254",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19254",
                  },
                  {
                     name: "19250",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19250",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-1269",
      datePublished: "2006-03-19T02:00:00",
      dateReserved: "2006-03-18T00:00:00",
      dateUpdated: "2024-08-07T17:03:28.767Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-1673 (GCVE-0-2007-1673)
Vulnerability from cvelistv5
Published
2007-05-09 01:00
Modified
2024-08-07 13:06
Severity ?
Summary
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
References
http://www.amavis.org/security/asa-2007-2.txtx_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/34080vdb-entry, x_refsource_XF
http://osvdb.org/36208vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/23823vdb-entry, x_refsource_BID
http://secunia.com/advisories/25315third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/467646/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://securityreason.com/securityalert/2680third-party-advisory, x_refsource_SREASON
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T13:06:25.976Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.amavis.org/security/asa-2007-2.txt",
               },
               {
                  name: "multiple-vendor-zoo-dos(34080)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080",
               },
               {
                  name: "36208",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/36208",
               },
               {
                  name: "23823",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/23823",
               },
               {
                  name: "25315",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25315",
               },
               {
                  name: "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded",
               },
               {
                  name: "2680",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SREASON",
                     "x_transferred",
                  ],
                  url: "http://securityreason.com/securityalert/2680",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-04-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-16T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.amavis.org/security/asa-2007-2.txt",
            },
            {
               name: "multiple-vendor-zoo-dos(34080)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080",
            },
            {
               name: "36208",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/36208",
            },
            {
               name: "23823",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/23823",
            },
            {
               name: "25315",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25315",
            },
            {
               name: "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded",
            },
            {
               name: "2680",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SREASON",
               ],
               url: "http://securityreason.com/securityalert/2680",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-1673",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.amavis.org/security/asa-2007-2.txt",
                     refsource: "CONFIRM",
                     url: "http://www.amavis.org/security/asa-2007-2.txt",
                  },
                  {
                     name: "multiple-vendor-zoo-dos(34080)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34080",
                  },
                  {
                     name: "36208",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/36208",
                  },
                  {
                     name: "23823",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/23823",
                  },
                  {
                     name: "25315",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25315",
                  },
                  {
                     name: "20070504 Multiple vendors ZOO file decompression infinite loop DoS",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/467646/100/0/threaded",
                  },
                  {
                     name: "2680",
                     refsource: "SREASON",
                     url: "http://securityreason.com/securityalert/2680",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-1673",
      datePublished: "2007-05-09T01:00:00",
      dateReserved: "2007-03-24T00:00:00",
      dateUpdated: "2024-08-07T13:06:25.976Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2006-0855 (GCVE-0-2006-0855)
Vulnerability from cvelistv5
Published
2006-02-23 21:00
Modified
2024-08-07 16:48
Severity ?
Summary
Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
References
http://securitytracker.com/id?1015866vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/19408third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_05_sr.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/19166third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_06_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.vupen.com/english/advisories/2006/1220vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/19514third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/546third-party-advisory, x_refsource_SREASON
http://www.gentoo.org/security/en/glsa/glsa-200603-05.xmlvendor-advisory, x_refsource_GENTOO
http://securitytracker.com/id?1015668vdb-entry, x_refsource_SECTRACK
http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txtx_refsource_MISC
http://secunia.com/advisories/19130third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/24904vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/0705vdb-entry, x_refsource_VUPEN
http://www.guay-leroux.com/projects/zoo-advisory.txtx_refsource_MISC
http://www.debian.org/security/2006/dsa-991vendor-advisory, x_refsource_DEBIAN
http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.htmlmailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/425887/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/19002third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19148third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/16790vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T16:48:56.934Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1015866",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1015866",
               },
               {
                  name: "19408",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19408",
               },
               {
                  name: "SUSE-SR:2006:005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html",
               },
               {
                  name: "19166",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19166",
               },
               {
                  name: "SUSE-SR:2006:006",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html",
               },
               {
                  name: "ADV-2006-1220",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/1220",
               },
               {
                  name: "19514",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19514",
               },
               {
                  name: "546",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SREASON",
                     "x_transferred",
                  ],
                  url: "http://securityreason.com/securityalert/546",
               },
               {
                  name: "GLSA-200603-05",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml",
               },
               {
                  name: "1015668",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1015668",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt",
               },
               {
                  name: "19130",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19130",
               },
               {
                  name: "zoo-misc-bo(24904)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904",
               },
               {
                  name: "ADV-2006-0705",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/0705",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.guay-leroux.com/projects/zoo-advisory.txt",
               },
               {
                  name: "DSA-991",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2006/dsa-991",
               },
               {
                  name: "20060403 Barracuda ZOO archiver security bug leads to remote compromise",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html",
               },
               {
                  name: "20060223 zoo contains exploitable buffer overflows",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded",
               },
               {
                  name: "19002",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19002",
               },
               {
                  name: "19148",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/19148",
               },
               {
                  name: "16790",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/16790",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-02-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-18T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1015866",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1015866",
            },
            {
               name: "19408",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19408",
            },
            {
               name: "SUSE-SR:2006:005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html",
            },
            {
               name: "19166",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19166",
            },
            {
               name: "SUSE-SR:2006:006",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html",
            },
            {
               name: "ADV-2006-1220",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/1220",
            },
            {
               name: "19514",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19514",
            },
            {
               name: "546",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SREASON",
               ],
               url: "http://securityreason.com/securityalert/546",
            },
            {
               name: "GLSA-200603-05",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml",
            },
            {
               name: "1015668",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1015668",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt",
            },
            {
               name: "19130",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19130",
            },
            {
               name: "zoo-misc-bo(24904)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904",
            },
            {
               name: "ADV-2006-0705",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/0705",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.guay-leroux.com/projects/zoo-advisory.txt",
            },
            {
               name: "DSA-991",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2006/dsa-991",
            },
            {
               name: "20060403 Barracuda ZOO archiver security bug leads to remote compromise",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html",
            },
            {
               name: "20060223 zoo contains exploitable buffer overflows",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded",
            },
            {
               name: "19002",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19002",
            },
            {
               name: "19148",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/19148",
            },
            {
               name: "16790",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/16790",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-0855",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1015866",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1015866",
                  },
                  {
                     name: "19408",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19408",
                  },
                  {
                     name: "SUSE-SR:2006:005",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_05_sr.html",
                  },
                  {
                     name: "19166",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19166",
                  },
                  {
                     name: "SUSE-SR:2006:006",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_06_sr.html",
                  },
                  {
                     name: "ADV-2006-1220",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/1220",
                  },
                  {
                     name: "19514",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19514",
                  },
                  {
                     name: "546",
                     refsource: "SREASON",
                     url: "http://securityreason.com/securityalert/546",
                  },
                  {
                     name: "GLSA-200603-05",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200603-05.xml",
                  },
                  {
                     name: "1015668",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1015668",
                  },
                  {
                     name: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt",
                     refsource: "MISC",
                     url: "http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt",
                  },
                  {
                     name: "19130",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19130",
                  },
                  {
                     name: "zoo-misc-bo(24904)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24904",
                  },
                  {
                     name: "ADV-2006-0705",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/0705",
                  },
                  {
                     name: "http://www.guay-leroux.com/projects/zoo-advisory.txt",
                     refsource: "MISC",
                     url: "http://www.guay-leroux.com/projects/zoo-advisory.txt",
                  },
                  {
                     name: "DSA-991",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2006/dsa-991",
                  },
                  {
                     name: "20060403 Barracuda ZOO archiver security bug leads to remote compromise",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2006-04/0061.html",
                  },
                  {
                     name: "20060223 zoo contains exploitable buffer overflows",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/425887/100/0/threaded",
                  },
                  {
                     name: "19002",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19002",
                  },
                  {
                     name: "19148",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/19148",
                  },
                  {
                     name: "16790",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/16790",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-0855",
      datePublished: "2006-02-23T21:00:00",
      dateReserved: "2006-02-23T00:00:00",
      dateUpdated: "2024-08-07T16:48:56.934Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}