WinProxy < 6.1a Telnet Proxy Remote DoS

High Nessus Plugin ID 20392


The remote telnet proxy server is affected by a denial of service vulnerability.


The remote host is running WinProxy, a proxy server for Windows.

The installed version of WinProxy's telnet proxy fails to handle a long string of 0xff characters. An attacker may be able to exploit this issue to crash the proxy, thereby denying service to valid users.


Upgrade to WinProxy version 6.1a or later.

See Also

Plugin Details

Severity: High

ID: 20392

File Name: winproxy_telnet_61a.nasl

Version: $Revision: 1.16 $

Type: remote

Agent: windows

Family: Windows

Published: 2006/01/10

Modified: 2011/09/12

Dependencies: 17975

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2006/01/05

Reference Information

CVE: CVE-2005-3654

BID: 16149

OSVDB: 22239