ID CVE-2005-4085
Summary Buffer overflow in BlueCoat (a) WinProxy before 6.1a and (b) the web console access functionality in ProxyAV before 2.4.2.3 allows remote attackers to execute arbitrary code via a long Host: header.
References
Vulnerable Configurations
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1a:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1a:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1b:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1b:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1c:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1c:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1e:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1e:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1f:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1f:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1h:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1h:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1k:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1k:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1m:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1m:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1n:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1n:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:4.0:r1p:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:4.0:r1p:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:5.0:r1a:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:5.0:r1a:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:5.0:r1b:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:5.0:r1b:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:5.0:r1c:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:5.0:r1c:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:5.1:r1a:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:5.1:r1a:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:5.1:r1d:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:5.1:r1d:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:5.1:r1e:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:5.1:r1e:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:5.2:r1a:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:5.2:r1a:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:6.0:r1a:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:6.0:r1a:*:*:*:*:*:*
  • cpe:2.3:a:bluecoat:webproxy:6.0:r1c:*:*:*:*:*:*
    cpe:2.3:a:bluecoat:webproxy:6.0:r1c:*:*:*:*:*:*
  • cpe:2.3:h:bluecoat:proxyav:*:*:*:*:*:*:*:*
    cpe:2.3:h:bluecoat:proxyav:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 08-03-2011 - 02:27)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 16147
confirm http://www.bluecoat.com/support/knowledge/advisory_host_header_stack_overflow.html
idefense 20060105 Blue Coat Systems WinProxy Host Header Stack Overflow Vulnerability
sectrack 1015441
secunia
  • 18288
  • 18909
vupen
  • ADV-2006-0065
  • ADV-2006-0622
Last major update 08-03-2011 - 02:27
Published 31-12-2005 - 05:00
Last modified 08-03-2011 - 02:27
Back to Top