| VID |
12019 |
| Severity |
40 |
| Port |
1080 |
| Protocol |
TCP |
| Class |
SOCKS |
| Detailed Description |
The SOCKS server (AnalogX Proxy) is vulnerable to a buffer overflow attack by a request with a too long hostname. AnalogX Proxy is a proxy server for the Windows platforms that has the ability to proxy requests for many different services. AnalogX Proxy versions 4.07 and earlier are vulnerable to a buffer overflow caused by improper handling of malformed Socks4a requests. By sending a Socks4a proxy request with a hostname section of 140 or more characters to TCP port 1080, a remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the Proxy process or cause the server to crash.
* References: http://online.securityfocus.com/bid/5138 http://www.iss.net/security_center/static/9456.php
* Platforms Affected: AnalogX Proxy 4.07 and earlier |
| Recommendation |
Upgrade to the latest version (4.12 or later) of AnalogX Proxy, available from http://www.analogx.com/contents/download/network/proxy.htm |
| Related URL |
CVE-2002-1001 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|