Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Proxytunnel: Format string vulnerability
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200411-07
(Proxytunnel: Format string vulnerability)
Florian Schilhabel of the Gentoo Linux Security Audit project found a
format string vulnerability in Proxytunnel. When the program is started in
daemon mode (-a [port]), it improperly logs invalid proxy answers to
A malicious remote server could send specially-crafted invalid answers to
exploit the format string vulnerability, potentially permiting the execution
of arbitrary code on the tunnelling host with the rights of the Proxytunnel
You can mitigate the issue by only permiting connections to trusted remote
All Proxytunnel users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|LOT 20 HP 405478-071 SAMSUNG M393T1K66AZA-CE6Q0 8GB 2Rx4 PC2-5300R MEMORY RAM
|Samsung 4GB PC3-12800 DDR3-1600MHz SODIMM Laptop Memory RAM M471B5273CH0-CK0
|Samsung -SM-T550- Galaxy Tab A- 9.7"- 16GB- White- Tablet *USED*
No Discussions have been posted on this vulnerability.