CVE-2006-2161

N/A Unknown
Published: May 09, 2006 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in (1) TZipBuilder 1.79.03.01, (2) Abakt 0.9.2 and 0.9.3-beta1, (3) CAM UnZip 4.0 and 4.3, and possibly other products, allows user-assisted attackers to execute arbitrary code via a ZIP archive that contains a file with a long file name.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/19945
Source: PSIRT-CNA@flexerasoftware.com
Patch Vendor Advisory
http://secunia.com/advisories/19946
Source: PSIRT-CNA@flexerasoftware.com
Patch Vendor Advisory
http://secunia.com/advisories/20068
Source: PSIRT-CNA@flexerasoftware.com
Patch Vendor Advisory
http://secunia.com/secunia_research/2006-26/advisory
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2006-31/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Patch Vendor Advisory
http://secunia.com/secunia_research/2006-34/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Patch Vendor Advisory
http://securityreason.com/securityalert/853
Source: PSIRT-CNA@flexerasoftware.com
http://securitytracker.com/id?1016064
Source: PSIRT-CNA@flexerasoftware.com
Patch
http://securitytracker.com/id?1016107
Source: PSIRT-CNA@flexerasoftware.com
Patch
http://www.securityfocus.com/bid/17880
Source: PSIRT-CNA@flexerasoftware.com
Patch
http://www.vupen.com/english/advisories/2006/1687
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2006/1805
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2006/1865
Source: PSIRT-CNA@flexerasoftware.com
http://marc.info/?l=full-disclosure&m=114771024009857&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19945
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/19946
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/20068
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/secunia_research/2006-26/advisory
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2006-31/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/secunia_research/2006-34/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://securityreason.com/securityalert/853
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016064
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://securitytracker.com/id?1016107
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/archive/1/433257/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434019/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/434520/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17880
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vupen.com/english/advisories/2006/1687
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1805
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1865
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.xs4all.nl/~edienske/abakt/releases.html#0.9.3-RC1
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/26275
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/26435
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/26549
Source: af854a3a-2127-422b-91ae-364da2661108

42 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.7%
82th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

roger_aelbrecht erik_dienske cam_development