Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Proxytunnel: Format string vulnerability
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200411-07
(Proxytunnel: Format string vulnerability)
Florian Schilhabel of the Gentoo Linux Security Audit project found a
format string vulnerability in Proxytunnel. When the program is started in
daemon mode (-a [port]), it improperly logs invalid proxy answers to
A malicious remote server could send specially-crafted invalid answers to
exploit the format string vulnerability, potentially permiting the execution
of arbitrary code on the tunnelling host with the rights of the Proxytunnel
You can mitigate the issue by only permiting connections to trusted remote
All Proxytunnel users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|Juniper EX3300 Juniper EX3300-24T Juniper Networks EX3300-24T
|Juniper SRX240 16-Port Gigabit Secure Services Gateway
|Juniper Networks J6350 J-6350-B 4-Port Gigabit Services Router 1x PSU Rack Ears
No Discussions have been posted on this vulnerability.