AnalogX Proxy Server Vulnerable to DoS Attack

AnalogX Proxy Server is vulnerable to a remote and local DoS attack. By sending multiple abnormal strings an attacker can crash the effected service.

Steve Manzuik

November 14, 2000

1 Min Read
ITPro Today logo

Reported November 15, 2000 by Network Security Solutions Inc.

VERSIONS AFFECTED

DESCRIPTIONBy sending multiple abnormal strings to either the FTP, SMTP, POP, or Proxy Logger services a malicious user could cause the Proxy server to stop functioning and the system to require a reboot.

The following is sample logfile output from an attacked Analog X Proxy Server;

    FTP Service error msg.:                                   ABORT: Last String too large for Buffer (1509 > 1024)                       

                                (log.c/114)   POP3 Service error msg.:                                         ABORT: Last String too large for Buffer (1509 > 1024)                        

                                       (log.c/114)  

 SMTP Service error msg.:                                   ABORT: Last String too large for Buffer (10301 > 1024)                        (log.c/114)

Services such as HTTP, SOCKS, and NNTP are not effected.

VENDOR RESPONSE

The vendor has been notified but no patch has be released. 

CREDITDiscovered by NSS Inc.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like