BugTraq
NII Advisory - Buffer Overflow in Analogx Proxy May 26 2003 02:11PM
K. K. Mookhey (cto nii co in) (1 replies)
Re: NII Advisory - Buffer Overflow in Analogx Proxy May 27 2003 09:18PM
Godwin Stewart (gstewart spamcop net)
And Thus Spake "K. K. Mookhey" <cto (at) nii.co (dot) in [email concealed]> (on Mon, 26 May 2003 19:41:38
+0530):

> ===============================================
> Buffer Overflow In Analogx Proxy 4.13
> Vendor: Analogx
> Versions affected: Proxy 4.13
> Date: 26th May 2003
> Type of Vulnerability: Remotely Exploitable Buffer Overflow
> Severity: High
> By: Network Intelligence India www.nii.co.in
> ===============================================

Unfortunately, the buffer overflow is not the only problem with AnalogX.

The default installation is "everything open", and a very large proportion
of the spam sent flying around the world is sent through open AnalogX
proxies.

http://tinyurl.com/csut (redirects to news.admin.net-abuse.email archives)

--
G. Stewart -- gstewart (at) bonivet (dot) net [email concealed] -- gstewart (at) spamcop (dot) net [email concealed]
Registered Linux user #284683
---------------------------------------------------------------
In the 60's people took acid to make the world weird.
Now the world is weird and people take Prozac to make
it normal.

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus