ProZilla Initial Server Response Remote Client-Side Format String Vulnerability
BID:12635
Info
ProZilla Initial Server Response Remote Client-Side Format String Vulnerability
| Bugtraq ID: | 12635 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-0523 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 23 2005 12:00AM |
| Updated: | Jul 12 2009 10:56AM |
| Credit: | This vulnerability was discovered by Deicide of ElectronicSouls. |
| Vulnerable: |
Prozilla ProZilla Download Accelerator 1.3.6 Prozilla ProZilla Download Accelerator 1.3.5 .2 Prozilla ProZilla Download Accelerator 1.3.5 .1 Prozilla ProZilla Download Accelerator 1.3.5 Prozilla ProZilla Download Accelerator 1.3.4 Prozilla ProZilla Download Accelerator 1.3.3 .x Prozilla ProZilla Download Accelerator 1.3.3 Prozilla ProZilla Download Accelerator 1.3.2 Prozilla ProZilla Download Accelerator 1.3.1 Prozilla ProZilla Download Accelerator 1.3 .0 Prozilla ProZilla Download Accelerator 1.0 x |
| Not Vulnerable: | |
Discussion
ProZilla Initial Server Response Remote Client-Side Format String Vulnerability
A remote client-side format string vulnerability is reported to exist in ProZilla. This issue is due to a failure of the application to properly implement a formatted string function. The format string vulnerability manifests when the affected application is handling initial server responses that contain format string specifiers.
An attacker may leverage this issue to execute arbitrary code on an affected computer with the privileges of an unsuspecting user that activated the vulnerable application.
Prozilla versions up to an including version 1.3.7.3 are reported prone to this vulnerability.
A remote client-side format string vulnerability is reported to exist in ProZilla. This issue is due to a failure of the application to properly implement a formatted string function. The format string vulnerability manifests when the affected application is handling initial server responses that contain format string specifiers.
An attacker may leverage this issue to execute arbitrary code on an affected computer with the privileges of an unsuspecting user that activated the vulnerable application.
Prozilla versions up to an including version 1.3.7.3 are reported prone to this vulnerability.
Exploit / POC
ProZilla Initial Server Response Remote Client-Side Format String Vulnerability
The following exploit is available:
The following exploit is available:
Solution / Fix
ProZilla Initial Server Response Remote Client-Side Format String Vulnerability
Solution:
Debian has released advisory DSA 719-1 and fixes to address this issue. Please see the referenced advisory to obtain fix information.
Prozilla ProZilla Download Accelerator 1.3.6
Solution:
Debian has released advisory DSA 719-1 and fixes to address this issue. Please see the referenced advisory to obtain fix information.
Prozilla ProZilla Download Accelerator 1.3.6
-
Debian prozilla_1.3.6-3woody2_alpha.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_alpha.deb -
Debian prozilla_1.3.6-3woody2_arm.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_arm.deb -
Debian prozilla_1.3.6-3woody2_hppa.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_hppa.deb -
Debian prozilla_1.3.6-3woody2_i386.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_i386.deb -
Debian prozilla_1.3.6-3woody2_ia64.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_ia64.deb -
Debian prozilla_1.3.6-3woody2_m68k.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_m68k.deb -
Debian prozilla_1.3.6-3woody2_mips.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_mips.deb -
Debian prozilla_1.3.6-3woody2_mipsel.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_mipsel.deb -
Debian prozilla_1.3.6-3woody2_powerpc.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_powerpc.deb -
Debian prozilla_1.3.6-3woody2_s390.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_s390.deb -
Debian prozilla_1.3.6-3woody2_sparc.deb
Debian GNU/Linux 3.0 alias woody
http://security.debian.org/pool/updates/main/p/prozilla/prozilla_1.3.6 -3woody2_sparc.deb
References
ProZilla Initial Server Response Remote Client-Side Format String Vulnerability
References:
References:
- ProZIlla Home Page (ProZIlla)