NEC SOCKS4 Module Username Handling Remote Overflow

Critical Nessus Plugin ID 11164


The remote SOCKS service is prone to a buffer overflow attack.


The SOCKS4 service running on the remote host crashes when it receives a request with a long username. An attacker may be able to leverage this issue to disable the remote service or even execute arbitrary code on the affected host.


Contact the vendor for a fix.

Plugin Details

Severity: Critical

ID: 11164

File Name: socks4_username_overflow.nasl

Version: $Revision: 1.20 $

Type: remote

Family: Firewalls

Published: 2002/11/25

Modified: 2015/12/04

Dependencies: 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2002-2368

BID: 5147

OSVDB: 2081, 55662

CWE: 119