WinProxy < 6.1a Telnet Proxy Remote DoS

high Nessus Plugin ID 20392

Synopsis

The remote telnet proxy server is affected by a denial of service vulnerability.

Description

The remote host is running WinProxy, a proxy server for Windows.

The installed version of WinProxy's telnet proxy fails to handle a long string of 0xff characters. An attacker may be able to exploit this issue to crash the proxy, thereby denying service to valid users.

Solution

Upgrade to WinProxy version 6.1a or later.

See Also

http://www.nessus.org/u?b140c13e

http://www.nessus.org/u?8c88612f

Plugin Details

Severity: High

ID: 20392

File Name: winproxy_telnet_61a.nasl

Version: 1.17

Type: remote

Agent: windows

Family: Windows

Published: 1/10/2006

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/5/2006

Reference Information

CVE: CVE-2005-3654

BID: 16149