cpe:/a:rahul_dhesi:zoo:2.10 CVE-2006-0855 2006-02-03T00:00:00.000-05:00 2006-02-23T16:02:00.000-05:00 2017-07-19T21:30:07.787-04:00 5.1 NETWORK HIGH NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2006-02-24T11:58:00.000-05:00 ALLOWS_USER_ACCESS SECTRACK 1015668 SECTRACK 1015866 BID 16790 SECUNIA 19002 SECUNIA 19130 SECUNIA 19148 SECUNIA 19166 SECUNIA 19408 SECUNIA 19514 BUGTRAQ 20060223 zoo contains exploitable buffer overflows BUGTRAQ 20060403 Barracuda ZOO archiver security bug leads to remote compromise SREASON 546 VUPEN ADV-2006-0705 VUPEN ADV-2006-1220 DEBIAN DSA-991 GENTOO GLSA-200603-05 SUSE SUSE-SR:2006:005 SUSE SUSE-SR:2006:006 MISC http://www.guay-leroux.com/projects/barracuda-advisory-ZOO.txt MISC http://www.guay-leroux.com/projects/zoo-advisory.txt XF zoo-misc-bo(24904) Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.