[VIM] zoo - amavis - barracuda cross-ref problems
security curmudgeon
jericho at attrition.org
Tue Jul 8 03:05:38 UTC 2008
On Wed, 25 Jul 2007, Steven M. Christey wrote:
Whee, time to dig up the past!
Clearing my mailbox, I revisted this and noticed:
: CVE didn't pick up SA25315, and we didn't independently notice the
: AMaViS advisory, which is why it wasn't mentioned. The phrasing for
: 2007-1669 definitely could have been better, instead of emphasizing
: Barracuda so much. I've changed both CVEs to mention AMaViS
: specifically.
:
: Note that the AMaViS advisory implies that the problem only occurs when
: AMaViS is installed on a system that already independently has the
: vulnerable ZOO software. So, this isn't necessarily a case of borrowed
: code appearing in AMaViS, rather a defense-in-depth measure like when
: Mozilla recently defended itself against the IE argument injection
: issue.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-1669
zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1)
Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2)
Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3)
AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of
service (infinite loop) via a ZOO archive with a direntry structure that
points to a previous file.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-1673
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier,
allows remote attackers to cause a denial of service (infinite loop) via a
ZOO archive with a direntry structure that points to a previous file.
--
Appears that these now overlap and are likely duplicates, where 1673 shows
a little more detail (unzoo.c), and 1669 has a better affected product
list.
More information about the VIM
mailing list