First published: Tue Mar 31 2015(Updated: )
William Robinet of Conostix S.A. reported a vulnerability in unzoo that leads to buffer overflow and, potentially, to code execution with the privileges of the user running unzoo. The patch is available in <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1207273">https://bugzilla.redhat.com/show_bug.cgi?id=1207273</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Unzoo Unzoo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.