First published: Thu Feb 23 2006(Updated: )
Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zoo Project Zoo | <=2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0855 is classified as a high-severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2006-0855, users should upgrade to Zoo version 2.11 or later, which addresses this buffer overflow issue.
CVE-2006-0855 affects Zoo versions 2.10 and earlier, including products such as Barracuda Spam Firewall.
CVE-2006-0855 is a stack-based buffer overflow vulnerability that can be exploited by user-assisted attackers.
Exploiting CVE-2006-0855 allows attackers to execute arbitrary code on the affected system.