AnalogX Proxy Server Vulnerable to DoS Attack
AnalogX Proxy Server is vulnerable to a remote and local DoS attack. By sending multiple abnormal strings an attacker can crash the effected service.
November 14, 2000
Reported November 15, 2000 by Network Security Solutions Inc. VERSIONS AFFECTED DESCRIPTIONBy sending multiple abnormal strings to either the FTP, SMTP, POP, or Proxy Logger services a malicious user could cause the Proxy server to stop functioning and the system to require a reboot. The following is sample logfile output from an attacked Analog X Proxy Server; FTP Service error msg.: ABORT: Last String too large for Buffer (1509 > 1024) (log.c/114) POP3 Service error msg.: ABORT: Last String too large for Buffer (1509 > 1024) (log.c/114) SMTP Service error msg.: ABORT: Last String too large for Buffer (10301 > 1024) (log.c/114) Services such as HTTP, SOCKS, and NNTP are not effected. VENDOR RESPONSE The vendor has been notified but no patch has be released. CREDITDiscovered by NSS Inc. |
About the Author
You May Also Like