5.1
CVSSv2

CVE-2006-0855

Published: 23/02/2006 Updated: 18/10/2018
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and previous versions, as used in products such as Barracuda Spam Firewall, allows user-assisted malicious users to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.

Vulnerable Product Search on Vulmon Subscribe to Product

rahul dhesi zoo

Vendor Advisories

Debian Bug report logs - #354461 zoo: buffer overflow when processing archives Package: zoo; Maintainer for zoo is Debian QA Group <packages@qadebianorg>; Source for zoo is src:zoo (PTS, buildd, popcon) Reported by: metaur@teliacom Date: Sun, 26 Feb 2006 15:48:07 UTC Severity: grave Tags: security Found in version zoo ...
Jean-Sébastien Guay-Leroux discovered a buffer overflow in zoo, a utility to manipulate zoo archives, that could lead to the execution of arbitrary code when unpacking a specially crafted zoo archive For the old stable distribution (woody) this problem has been fixed in version 210-9woody0 For the stable distribution (sarge) this problem has be ...