NEC SOCKS4 Module Username Handling Remote Overflow

critical Nessus Plugin ID 11164

Synopsis

The remote SOCKS service is prone to a buffer overflow attack.

Description

The SOCKS4 service running on the remote host crashes when it receives a request with a long username. An attacker may be able to leverage this issue to disable the remote service or even execute arbitrary code on the affected host.

Solution

Contact the vendor for a fix.

Plugin Details

Severity: Critical

ID: 11164

File Name: socks4_username_overflow.nasl

Version: 1.21

Type: remote

Family: Firewalls

Published: 11/25/2002

Updated: 7/30/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2002-2368

BID: 5147

CWE: 119