2.6
CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2006-0926

First published: Tue Feb 28 2006(Updated: )

Multiple directory traversal vulnerabilities in Allume StuffIt Standard and Deluxe 9.0, ZipMagic Deluxe 9.0, and StuffIt Expander 9.0.0.21 Engine 9.0.0.21 allow remote attackers to create and overwrite arbitrary files via certain crafted pathnames in a (1) zip or (2) tar archive.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Smithmicro Stuffit Deluxe=9.0
Smithmicro Stuffit Standard=9.0
Smithmicro Stuffit Expander=9.0.0.21_engine_9.0.0.21
Smithmicro Zipmagic Deluxe=9.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-0926?

    CVE-2006-0926 is considered a high-severity vulnerability due to its potential to allow remote attackers to overwrite arbitrary files.

  • How do I fix CVE-2006-0926?

    To mitigate CVE-2006-0926, users should update Allume StuffIt Standard, Deluxe, ZipMagic Deluxe, and StuffIt Expander to the latest versions provided by Smith Micro.

  • What types of software are affected by CVE-2006-0926?

    CVE-2006-0926 affects Allume StuffIt Standard 9.0, StuffIt Deluxe 9.0, ZipMagic Deluxe 9.0, and StuffIt Expander 9.0.0.21.

  • What is a directory traversal vulnerability as seen in CVE-2006-0926?

    A directory traversal vulnerability allows an attacker to access restricted directories and manipulate files outside of the intended directory.

  • Can CVE-2006-0926 be exploited remotely?

    Yes, CVE-2006-0926 can be exploited remotely by attackers using crafted pathnames in zip or tar archives.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203