Unrated severityNVD Advisory· Published Feb 23, 2006· Updated Apr 16, 2026
CVE-2006-0855
CVE-2006-0855
Description
Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- secunia.com/advisories/19166nvdPatchVendor Advisory
- secunia.com/advisories/19514nvdPatchVendor Advisory
- securitytracker.com/idnvdPatch
- www.debian.org/security/2006/dsa-991nvdPatchVendor Advisory
- www.gentoo.org/security/en/glsa/glsa-200603-05.xmlnvdPatchVendor Advisory
- archives.neohapsis.com/archives/bugtraq/2006-04/0061.htmlnvdExploitVendor Advisory
- www.guay-leroux.com/projects/barracuda-advisory-ZOO.txtnvdExploitVendor Advisory
- www.guay-leroux.com/projects/zoo-advisory.txtnvdExploitVendor Advisory
- secunia.com/advisories/19002nvdVendor Advisory
- secunia.com/advisories/19130nvdVendor Advisory
- secunia.com/advisories/19148nvdVendor Advisory
- secunia.com/advisories/19408nvdVendor Advisory
- www.novell.com/linux/security/advisories/2006_05_sr.htmlnvdVendor Advisory
- www.novell.com/linux/security/advisories/2006_06_sr.htmlnvdVendor Advisory
- www.vupen.com/english/advisories/2006/0705nvdVendor Advisory
- www.vupen.com/english/advisories/2006/1220nvdVendor Advisory
- securityreason.com/securityalert/546nvd
- securitytracker.com/idnvd
- www.securityfocus.com/archive/1/425887/100/0/threadednvd
- www.securityfocus.com/bid/16790nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/24904nvd
News mentions
0No linked articles in our index yet.