|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: zoo|
|Summary:||FreeBSD Ports: zoo|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following package is affected: zoo
Stack-based buffer overflow in the fullpath function in misc.c for zoo
2.10 and earlier allows user-complicit attackers to execute arbitrary
code via a crafted ZOO file that causes the combine function to return
a longer string than expected.
Update your system with the appropriate patches or
BugTraq ID: 16790|
Common Vulnerability Exposure (CVE) ID: CVE-2006-0855
Bugtraq: 20060223 zoo contains exploitable buffer overflows (Google Search)
Bugtraq: 20060403 Barracuda ZOO archiver security bug leads to remote compromise (Google Search)
Debian Security Information: DSA-991 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:005 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:006 (Google Search)
XForce ISS Database: zoo-misc-bo(24904)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.