NEC SOCKS4 Module Username Handling Remote Overflow

Critical Nessus Plugin ID 11164


The remote SOCKS service is prone to a buffer overflow attack.


The SOCKS4 service running on the remote host crashes when it receives a request with a long username. An attacker may be able to leverage this issue to disable the remote service or even execute arbitrary code on the affected host.


Contact the vendor for a fix.

Plugin Details

Severity: Critical

ID: 11164

File Name: socks4_username_overflow.nasl

Version: 1.21

Type: remote

Family: Firewalls

Published: 2002/11/25

Modified: 2018/07/30

Dependencies: 17975

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2002-2368

BID: 5147

CWE: 119