Vulnerability Name: | CVE-2002-1001 (CCN-9455) | ||||||||
Assigned: | 2002-07-01 | ||||||||
Published: | 2002-07-01 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | Buffer overflows in AnalogX Proxy before 4.12 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long HTTP request to TCP port 6588 or (2) a SOCKS 4A request to TCP port 1080 with a long DNS hostname. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20020701 Foundstone Advisory - Buffer Overflow in AnalogX Proxy (fwd) Source: CCN Type: Foundstone Labs Security Advisory FS-070102-23-AXPR Buffer Overflow in AnalogX Proxy Source: MITRE Type: CNA CVE-2002-1001 Source: CCN Type: AnalogX Web site Network Downloads: Proxy /// AnalogX Source: CONFIRM Type: UNKNOWN http://www.analogx.com/contents/download/network/proxy.htm Source: XF Type: Vendor Advisory analogx-proxy-http-bo(9455) Source: XF Type: Vendor Advisory analogx-proxy-socks4a-bo(9456) Source: BID Type: Exploit, Patch, Vendor Advisory 5138 Source: CCN Type: BID-5138 AnalogX Proxy Socks4A Buffer Overflow Vulnerability Source: BID Type: Exploit, Patch, Vendor Advisory 5139 Source: CCN Type: BID-5139 AnalogX Proxy Web Proxy Buffer Overflow Vulnerability Source: CCN Type: BID-514 Microsoft Windows Invalid IGMP Header DoS Vulnerability Source: XF Type: UNKNOWN analogx-proxy-http-bo(9455) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Vulnerability Name: | CVE-2002-1001 (CCN-9456) | ||||||||
Assigned: | 2002-07-01 | ||||||||
Published: | 2002-07-01 | ||||||||
Updated: | 2002-07-01 | ||||||||
Summary: | AnalogX Proxy is vulnerable to a buffer overflow caused by improper handling of malformed Socks4a requests. By sending a Socks4a proxy request with an overly long hostname to TCP port 1080, a remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the Proxy daemon or cause the server to crash. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Foundstone Labs Security Advisory FS-070102-23-AXPR Buffer Overflow in AnalogX Proxy Source: CCN Type: Nessus plugin ID : 11126 SOCKS4A hostname overflow Source: MITRE Type: CNA CVE-2002-1001 Source: CCN Type: AnalogX Web site Network Downloads: Proxy /// AnalogX Source: CCN Type: BID-5138 AnalogX Proxy Socks4A Buffer Overflow Vulnerability Source: CCN Type: BID-5139 AnalogX Proxy Web Proxy Buffer Overflow Vulnerability Source: XF Type: UNKNOWN analogx-proxy-socks4a-bo(9456) | ||||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |