Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Proxytunnel: Format string vulnerability
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200411-07
(Proxytunnel: Format string vulnerability)
Florian Schilhabel of the Gentoo Linux Security Audit project found a
format string vulnerability in Proxytunnel. When the program is started in
daemon mode (-a [port]), it improperly logs invalid proxy answers to
A malicious remote server could send specially-crafted invalid answers to
exploit the format string vulnerability, potentially permiting the execution
of arbitrary code on the tunnelling host with the rights of the Proxytunnel
You can mitigate the issue by only permiting connections to trusted remote
All Proxytunnel users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|OWC / Other World Computing 1TB Aura Internal 6G mSATA SSD #OWCSSDA12K960
|Dell OptiPlex 3050 MT i5-7500 7th Gen 8GB 2400MHz 1TB Tower DVD-RW
|Samsung 1TB Laptop Hard Drive ST1000LM024 HN-M101MBB/M1 "TESTED"
|Panasonic Toughbook CF-52 Laptop 2.26ghz Core 2 Duo 1TB HHD HD 4GB MM DualTouch
No Discussions have been posted on this vulnerability.