Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qh5m-qm4j-4q2w

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.

Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.

EPSS

Процентиль: 83%
0.0196
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 19 лет назад

Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.

nvd
больше 19 лет назад

Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.

debian
больше 19 лет назад

Stack-based buffer overflow in the fullpath function in misc.c for zoo ...

EPSS

Процентиль: 83%
0.0196
Низкий

Дефекты

CWE-119