Korean
<< Back
VID 12019
Severity 40
Port 1080
Protocol TCP
Class SOCKS
Detailed Description The SOCKS server (AnalogX Proxy) is vulnerable to a buffer overflow attack by a request with a too long hostname.
AnalogX Proxy is a proxy server for the Windows platforms that has the ability to proxy requests for many different services. AnalogX Proxy versions 4.07 and earlier are vulnerable to a buffer overflow caused by improper handling of malformed Socks4a requests. By sending a Socks4a proxy request with a hostname section of 140 or more characters to TCP port 1080, a remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the Proxy process or cause the server to crash.

* References:
http://online.securityfocus.com/bid/5138
http://www.iss.net/security_center/static/9456.php

* Platforms Affected:
AnalogX Proxy 4.07 and earlier
Recommendation Upgrade to the latest version (4.12 or later) of AnalogX Proxy, available from http://www.analogx.com/contents/download/network/proxy.htm
Related URL CVE-2002-1001 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)