CVE-2006-2161

Buffer overflow in (1) TZipBuilder 1.79.03.01, (2) Abakt 0.9.2 and 0.9.3-beta1, (3) CAM UnZip 4.0 and 4.3, and possibly other products, allows user-assisted attackers to execute arbitrary code via a ZIP archive that contains a file with a long file name.
References
Link Resource
http://marc.info/?l=full-disclosure&m=114771024009857&w=2
http://secunia.com/advisories/19945 Patch Vendor Advisory
http://secunia.com/advisories/19946 Patch Vendor Advisory
http://secunia.com/advisories/20068 Patch Vendor Advisory
http://secunia.com/secunia_research/2006-26/advisory Vendor Advisory
http://secunia.com/secunia_research/2006-31/advisory/ Patch Vendor Advisory
http://secunia.com/secunia_research/2006-34/advisory/ Patch Vendor Advisory
http://securityreason.com/securityalert/853
http://securitytracker.com/id?1016064 Patch
http://securitytracker.com/id?1016107 Patch
http://www.securityfocus.com/archive/1/433257/100/0/threaded
http://www.securityfocus.com/archive/1/434019/100/0/threaded
http://www.securityfocus.com/archive/1/434520/100/0/threaded
http://www.securityfocus.com/bid/17880 Patch
http://www.vupen.com/english/advisories/2006/1687
http://www.vupen.com/english/advisories/2006/1805
http://www.vupen.com/english/advisories/2006/1865
http://www.xs4all.nl/~edienske/abakt/releases.html#0.9.3-RC1
https://exchange.xforce.ibmcloud.com/vulnerabilities/26275
https://exchange.xforce.ibmcloud.com/vulnerabilities/26435
https://exchange.xforce.ibmcloud.com/vulnerabilities/26549
http://marc.info/?l=full-disclosure&m=114771024009857&w=2
http://secunia.com/advisories/19945 Patch Vendor Advisory
http://secunia.com/advisories/19946 Patch Vendor Advisory
http://secunia.com/advisories/20068 Patch Vendor Advisory
http://secunia.com/secunia_research/2006-26/advisory Vendor Advisory
http://secunia.com/secunia_research/2006-31/advisory/ Patch Vendor Advisory
http://secunia.com/secunia_research/2006-34/advisory/ Patch Vendor Advisory
http://securityreason.com/securityalert/853
http://securitytracker.com/id?1016064 Patch
http://securitytracker.com/id?1016107 Patch
http://www.securityfocus.com/archive/1/433257/100/0/threaded
http://www.securityfocus.com/archive/1/434019/100/0/threaded
http://www.securityfocus.com/archive/1/434520/100/0/threaded
http://www.securityfocus.com/bid/17880 Patch
http://www.vupen.com/english/advisories/2006/1687
http://www.vupen.com/english/advisories/2006/1805
http://www.vupen.com/english/advisories/2006/1865
http://www.xs4all.nl/~edienske/abakt/releases.html#0.9.3-RC1
https://exchange.xforce.ibmcloud.com/vulnerabilities/26275
https://exchange.xforce.ibmcloud.com/vulnerabilities/26435
https://exchange.xforce.ibmcloud.com/vulnerabilities/26549
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cam_development:cam_unzip:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cam_development:cam_unzip:4.3:*:*:*:*:*:*:*
cpe:2.3:a:erik_dienske:abakt:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:erik_dienske:abakt:0.9.3_beta1:*:*:*:*:*:*:*
cpe:2.3:a:roger_aelbrecht:tzipbuilder:1.79.03.01:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-05-09 10:02

Updated : 2025-04-03 01:03


NVD link : CVE-2006-2161

Mitre link : CVE-2006-2161

CVE.ORG link : CVE-2006-2161


JSON object : View

Products Affected

cam_development

  • cam_unzip

erik_dienske

  • abakt

roger_aelbrecht

  • tzipbuilder