CVE-2006-1269

Zoo 2.10 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation. NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.

Exploits (1)

exploitdb WORKING POC
by Josh Bressers · textdoslinux
https://www.exploit-db.com/exploits/27425

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/17126
Exploit, Patch vendor-advisory x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200603-12.xml
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25264
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0969
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19254
Exploit, Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19250

Scores

EPSS 0.0025
EPSS Percentile 48.5%

Details

Status published
Products (1)
rahul_dhesi/zoo 2.10
Published Mar 19, 2006
Tracked Since Feb 18, 2026