Описание
Multiple stack-based buffer overflows in the filter service (aka k9filter.exe) in Blue Coat K9 Web Protection 3.2.44 with Filter 3.2.32 allow (1) remote attackers to execute arbitrary code via a long HTTP Referer header to the K9 Web Protection Administration interface and (2) man-in-the-middle attackers to execute arbitrary code via an HTTP response with a long HTTP version field.
Multiple stack-based buffer overflows in the filter service (aka k9filter.exe) in Blue Coat K9 Web Protection 3.2.44 with Filter 3.2.32 allow (1) remote attackers to execute arbitrary code via a long HTTP Referer header to the K9 Web Protection Administration interface and (2) man-in-the-middle attackers to execute arbitrary code via an HTTP response with a long HTTP version field.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-2952
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44123
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44124
- http://secunia.com/advisories/25813
- http://secunia.com/secunia_research/2007-61/advisory
- http://secunia.com/secunia_research/2007-64/advisory
- http://www.securityfocus.com/archive/1/494975/100/0/threaded
- http://www.securityfocus.com/archive/1/494984/100/0/threaded
- http://www.securityfocus.com/bid/30463
- http://www.securityfocus.com/bid/30464
- http://www.securitytracker.com/id?1020587
- http://www.securitytracker.com/id?1020588
- http://www.vupen.com/english/advisories/2008/2263/references
Связанные уязвимости
Multiple stack-based buffer overflows in the filter service (aka k9filter.exe) in Blue Coat K9 Web Protection 3.2.44 with Filter 3.2.32 allow (1) remote attackers to execute arbitrary code via a long HTTP Referer header to the K9 Web Protection Administration interface and (2) man-in-the-middle attackers to execute arbitrary code via an HTTP response with a long HTTP version field.