This script is Copyright (C) 2008-2011 Marcin Kozlowski
The remote proxy is affected by a buffer overflow vulnerability.
The remote host is running 3proxy, an application proxy supporting
many protocols (Telnet, FTP, WWW, and more).
A stack overflow vulnerability has been detected in 3proxy prior to
0.5.3h and 0.6b-devel before 20070413. By sending a long host header
in HTTP GET request, a remote attacker could overflow a buffer and
execute arbitrary code.
See also :
Upgrade to 3proxy version 0.5.3h or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 31094 (3proxy_logurl_overflow.nasl)
Bugtraq ID: 23545
CVE ID: CVE-2007-2031
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.