Description
Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.
Exploits (1)
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17126
Exploit, Patch x_refsource_misc
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=183426
Exploit, Patch vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25264
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0969
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19254
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19250
Scores
EPSS
0.0025
EPSS Percentile
48.5%
Details
Status
published
Products (1)
rahul_dhesi/zoo
2.10
Published
Mar 19, 2006
Tracked Since
Feb 18, 2026