CCProxy < 6.3 Logging Function HTTP GET Request Remote Overflow

medium Nessus Network Monitor Plugin ID 2412

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running CCProxy, an application proxy supporting many protocols (Telnet, FTP, WWW, and more). There is a buffer overflow in the remote version of this software that may allow an attacker to execute arbitrary code on the remote host with the privileges of the user running the proxy.

Solution

Upgrade to CCProxy 6.3 or higher.

See Also

http://archives.neohapsis.com/archives/secunia/2004-q4/0449.html

http://www.securiteam.com/exploits/6E0032KBPM.html

Plugin Details

Severity: Medium

ID: 2412

Family: SMTP Servers

Published: 11/22/2004

Updated: 3/6/2019

Nessus ID: 15774

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 6.2

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:youngzsoft:ccproxy

Exploitable With

Metasploit (CCProxy <= v6.2 Telnet Proxy Ping Overflow)

Reference Information

CVE: CVE-2004-2416

BID: 11666