Lucene search

K
freebsdFreeBSDD9307A41-C4D7-11DA-B2FB-000E0C2E438A
HistoryFeb 22, 2006 - 12:00 a.m.

zoo -- stack based buffer overflow

2006-02-2200:00:00
vuxml.freebsd.org
9

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.7%

Jean-Sébastien Guay-Leroux report a vulnerability
within the zoo archiver. The vulnerability which is present
in the fullpath() function (from the misc.c file) is caused by
improper checking of user supplied data. The data returned
to the buffer can be up to 512 bytes, while the buffer is
created to hold 256 bytes. This could result in a buffer
overflow which could allow remote code execution.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchzoo< 2.10.1_2UNKNOWN

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.7%