Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.900103
Kategorie:Buffer overflow
Titel:Blue Coat K9 Web Protection Multiple Buffer Overflow Vulnerabilities
Zusammenfassung:Blue Coat K9 Web Protection is prone to a stack based buffer overflow vulnerability.
Beschreibung:Summary:
Blue Coat K9 Web Protection is prone to a stack based buffer overflow vulnerability.

Vulnerability Insight:
The flaws exist due to errors in filter services (k9filter.exe) when handling

- http version information in responses from a centralised server
(sp.cwfservice.net).

- Referer: headers during access to the web-based K9 Web Protection
Administration interface.

Vulnerability Impact:
Successful exploitation could allow remote attackers to cause
stack based buffer overflow by sending specially crafted malicious
code containing and overly long http version information and
reference header.

Affected Software/OS:
Blue Coat K9 Web Protection versions 3.2.44 and prior on Windows (All)

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-2752
BugTraq ID: 24018
http://www.securityfocus.com/bid/24018
https://www.exploit-db.com/exploits/3936
http://osvdb.org/36092
http://secunia.com/advisories/25304
http://www.vupen.com/english/advisories/2007/1853
XForce ISS Database: runaway-devami-sql-injection(34491)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34491
CopyrightCopyright (C) 2008 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.