WinProxy < 6.1 R1c HTTP CONNECT Request Overflow

Medium Nessus Network Monitor Plugin ID 3902

Synopsis

The remote HTTP proxy is affected by a buffer overflow vulnerability.

Description

The remote host is running WinProxy, a proxy server for Windows. The version of WinProxy installed on the remote host reportedly contains a design issue that may result in a buffer overflow vulnerability. Using a specially-crafted HTTP CONNECT request, a remote attacker may be able to leverage this issue to execute arbitrary code on the affected host subject to the privileges under which the service runs.

Solution

Upgrade to version 6.1 R1c or higher.

See Also

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=471

http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0107.html

http://www.securityfocus.com/archive/1/[email protected]

Plugin Details

Severity: Medium

ID: 3902

File Name: 3902.prm

Family: FTP Servers

Published: 2007/02/06

Modified: 2016/01/21

Dependencies: 1803, 1804, 3222

Nessus ID: 24277

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2007-0796

BID: 22393

OSVDB: 33097