Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Proxytunnel: Format string vulnerability
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200411-07
(Proxytunnel: Format string vulnerability)
Florian Schilhabel of the Gentoo Linux Security Audit project found a
format string vulnerability in Proxytunnel. When the program is started in
daemon mode (-a [port]), it improperly logs invalid proxy answers to
A malicious remote server could send specially-crafted invalid answers to
exploit the format string vulnerability, potentially permiting the execution
of arbitrary code on the tunnelling host with the rights of the Proxytunnel
You can mitigate the issue by only permiting connections to trusted remote
All Proxytunnel users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Cisco C9300-24P-E Catalyst 9300 Network Essentials Switch 24 Ports
|NEW 16510 Extreme Networks Summit X440-48P-10G 48x 10/100/1000BASE-T PoE-plus
No Discussions have been posted on this vulnerability.