Lucene search

K
gentooGentoo FoundationGLSA-200603-12
HistoryMar 16, 2006 - 12:00 a.m.

zoo: Buffer overflow

2006-03-1600:00:00
Gentoo Foundation
security.gentoo.org
17

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%

Background

zoo is a file archiving utility for maintaining collections of files, written by Rahul Dhesi.

Description

zoo is vulnerable to a new buffer overflow due to insecure use of the strcpy() function when trying to create an archive from certain directories or filenames.

Impact

An attacker could exploit this issue by enticing a user to create a zoo archive of specially crafted directories and filenames, possibly leading to the execution of arbitrary code with the rights of the user running zoo.

Workaround

There is no known workaround at this time.

Resolution

All zoo users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-arch/zoo-2.10-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-arch/zoo< 2.10-r2UNKNOWN

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

0.4%