ProZilla < Location Header Format String

Medium Nessus Network Monitor Plugin ID 2644


The remote client is vulnerable to a remote overflow.


The remote host is using Prozilla, a download accelerator for Linux and Unix systems. The remote version of this software contains a flaw in the way that it handles server HTTP headers. Specifically, Prozilla does not properly handle format strings, which would allow the remote attacker to execute arbitrary code on the client (Prozilla) machine. An attacker exploiting this flaw would need to be able to convince a user to browse a malicious website. In addition, the remote host is reported vulnerable to a remote buffer overflow. The details of this overflow have not been made public at this time.


Upgrade to version or higher.

Plugin Details

Severity: Medium

ID: 2644

File Name: 2644.prm

Family: Web Clients

Published: 2005/02/24

Modified: 2016/02/05

Dependencies: 1735, 8314

Risk Information

Risk Factor: Medium


Base Score: 5.4

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:C/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 5.8

Temporal Score: 5.3


Temporal Vector: CVSS3#E:F/RL:O/RC:X

Reference Information

CVE: CVE-2005-0523, CVE-2005-2961

BID: 12635, 14993

OSVDB: 14181