Vulnerability Name:

CVE-2002-1001 (CCN-9455)

Assigned:2002-07-01
Published:2002-07-01
Updated:2008-09-05
Summary:Buffer overflows in AnalogX Proxy before 4.12 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long HTTP request to TCP port 6588 or (2) a SOCKS 4A request to TCP port 1080 with a long DNS hostname.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: BUGTRAQ
Type: UNKNOWN
20020701 Foundstone Advisory - Buffer Overflow in AnalogX Proxy (fwd)

Source: CCN
Type: Foundstone Labs Security Advisory FS-070102-23-AXPR
Buffer Overflow in AnalogX Proxy

Source: MITRE
Type: CNA
CVE-2002-1001

Source: CCN
Type: AnalogX Web site
Network Downloads: Proxy /// AnalogX

Source: CONFIRM
Type: UNKNOWN
http://www.analogx.com/contents/download/network/proxy.htm

Source: XF
Type: Vendor Advisory
analogx-proxy-http-bo(9455)

Source: XF
Type: Vendor Advisory
analogx-proxy-socks4a-bo(9456)

Source: BID
Type: Exploit, Patch, Vendor Advisory
5138

Source: CCN
Type: BID-5138
AnalogX Proxy Socks4A Buffer Overflow Vulnerability

Source: BID
Type: Exploit, Patch, Vendor Advisory
5139

Source: CCN
Type: BID-5139
AnalogX Proxy Web Proxy Buffer Overflow Vulnerability

Source: CCN
Type: BID-514
Microsoft Windows Invalid IGMP Header DoS Vulnerability

Source: XF
Type: UNKNOWN
analogx-proxy-http-bo(9455)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:analogx:proxy:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:analogx:proxy:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2002-1001 (CCN-9456)

    Assigned:2002-07-01
    Published:2002-07-01
    Updated:2002-07-01
    Summary:AnalogX Proxy is vulnerable to a buffer overflow caused by improper handling of malformed Socks4a requests. By sending a Socks4a proxy request with an overly long hostname to TCP port 1080, a remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the Proxy daemon or cause the server to crash.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Consequences:Gain Access
    References:Source: CCN
    Type: Foundstone Labs Security Advisory FS-070102-23-AXPR
    Buffer Overflow in AnalogX Proxy

    Source: CCN
    Type: Nessus plugin ID : 11126
    SOCKS4A hostname overflow

    Source: MITRE
    Type: CNA
    CVE-2002-1001

    Source: CCN
    Type: AnalogX Web site
    Network Downloads: Proxy /// AnalogX

    Source: CCN
    Type: BID-5138
    AnalogX Proxy Socks4A Buffer Overflow Vulnerability

    Source: CCN
    Type: BID-5139
    AnalogX Proxy Web Proxy Buffer Overflow Vulnerability

    Source: XF
    Type: UNKNOWN
    analogx-proxy-socks4a-bo(9456)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:analogx:proxy:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:analogx:proxy:4.0.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    analogx proxy 4.0
    analogx proxy 4.0.1
    analogx proxy 4.0.2
    analogx proxy 4.0.3
    analogx proxy 4.0.4
    analogx proxy 4.0.5
    analogx proxy 4.0.6
    analogx proxy 4.0.7
    analogx proxy 4.0
    analogx proxy 4.0.1
    analogx proxy 4.0.2
    analogx proxy 4.0.3
    analogx proxy 4.0.4
    analogx proxy 4.0.5
    analogx proxy 4.0.6
    analogx proxy 4.0.7
    analogx proxy 4.0
    analogx proxy 4.0.1
    analogx proxy 4.0.2
    analogx proxy 4.0.3
    analogx proxy 4.0.4
    analogx proxy 4.0.5
    analogx proxy 4.0.6
    analogx proxy 4.0.7