AnalogX Proxy Server DoS Vulnerability
BID:2027
Info
AnalogX Proxy Server DoS Vulnerability
| Bugtraq ID: | 2027 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Nov 23 2000 12:00AM |
| Updated: | Nov 23 2000 12:00AM |
| Credit: | Discovered and posted to Bugtraq by Network Security Solutions <[email protected]> on Nov 23, 2000. |
| Vulnerable: |
AnalogX Proxy 4.10 |
| Not Vulnerable: | |
Discussion
AnalogX Proxy Server DoS Vulnerability
AnalogX Proxy Server enables networked computers to request various internet services through the proxy gateway. AnalogX supports most common internet protocols.
AnalogX Proxy Server is subject to a denial of service. Requesting unusually long arguments to the FTP, SMTP and POP3 service, the server will stop responding. A restart of the server service is required in order to gain normal functionality.
Successful exploitation of this vulnerability could lead to the execution of arbitrary code on the target host, however this has not been verified.
AnalogX Proxy Server enables networked computers to request various internet services through the proxy gateway. AnalogX supports most common internet protocols.
AnalogX Proxy Server is subject to a denial of service. Requesting unusually long arguments to the FTP, SMTP and POP3 service, the server will stop responding. A restart of the server service is required in order to gain normal functionality.
Successful exploitation of this vulnerability could lead to the execution of arbitrary code on the target host, however this has not been verified.
Solution / Fix
AnalogX Proxy Server DoS Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].