Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detects directory traversal file access and DoS vulnerability in CProxy
Detailed Explanation for this Vulnerability Assessment
The remote HTTP proxy server is affected by multiple issues.
The remote host is running a version of Computalynx's CProxy Server
that suffers from the following vulnerabilities:
- Arbitrary Local File Access
CProxy permits a possible hacker to retrieve arbitrary local files
by issuing an HTTP request with directory traversal sequences
relative to a subdirectory under CProxy's cache/intracache
directory. This may lead to the disclosure of sensitive
- Denial of Service Vulnerability
A possible hacker may crash the proxy while requesting arbitrary
local files, either by requesting an executable file or by
using a GET (as opposed to HEAD or POST) request.
See also :
Unknown at this time.
Network Security Threat Level:
Low / CVSS Base Score : 3
Networks Security ID: 12722
Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security
|Corsair PC3-19200 16GB DIMM 2400 MHz PC3-19200 DDR3 Memory (CMY16GX3M2A2400C11R)
|Apple Mac Pro (2015) Cylinder 3.0GHz 8-Core, 64GB RAM, Dual D700 6GB, Mint
|Komputerbay 4GB 2X 2GB DDR2 667MHz PC2-5300 PC2-5400 DDR2 667 (240 PIN) DIMM
|Komputerbay 4GB DDR2 800MHz PC2-6300 PC2-6400 DDR2 800 (200 PIN) SODIMM Laptop
No Discussions have been posted on this vulnerability.