Korean
<< Back
VID 12009
Severity 40
Port 1080
Protocol TCP
Class SOCKS
Detailed Description The SOCKS server is vulnerable to a buffer overflow attack by a request with a too long username.
SOCKS is a general-purpose TCP/IP proxy that isolates and handles most Web traffic. It is available for Unix, Linux, and Microsoft operating environments. SOCKS5 versions 1.0 r11 and earlier and SOCKS4 versions 4.3.beta2 and earlier are vulnerable to a buffer overflow caused by improper bounds checking of usernames. By sending an username of 132 bytes or greater, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the SOCKS server to crash.

* Platforms Affected:
Linux Any version
SOCKS 5-v1.0 r11 and prior
SOCKS4 4.3.beta2 and prior
Unix Any version
Windows Any version
Recommendation Patches were not issued and are not available as of July 2002. As a workaround, disable the SOCKS service until the patches are provided. If the upgraded versions of SOCKS are available, you can find the download sites though information at http://www.socks.nec.com/socksfaq.html
Related URL CVE-2002-2368 (CVE)
Related URL 5145,5147 (SecurityFocus)
Related URL 9485 (ISS)