Blue Coat Authentication and Authorization Agent Remote Overflow

critical Nessus Plugin ID 68928

Synopsis

The remote host has an authentication application installed that is affected by a code execution vulnerability.

Description

The version of Blue Coat Authentication and Authorization Agent installed on the remote Windows host is earlier than build 60258. It is, therefore, potentially affected by a stack-based buffer overflow vulnerability when handling specially crafted TCP packets on port 16102. By exploiting this flaw, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.

Solution

Upgrade to build 60258 or later.

See Also

http://web.archive.org/web/20120509094126/https://kb.bluecoat.com/index?page=content&id=SA55

Plugin Details

Severity: Critical

ID: 68928

File Name: bluecoat_auth_agent_sa55.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 7/17/2013

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-5124

Vulnerability Information

CPE: cpe:/a:bluecoat:proxysg

Required KB Items: SMB/BCAAA/Path, SMB/BCAAA/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/4/2011

Vulnerability Publication Date: 4/4/2011

Exploitable With

Metasploit (Blue Coat Authentication and Authorization Agent (BCAAA) 5 Buffer Overflow)

Reference Information

CVE: CVE-2011-5124

BID: 47618