Vulnerabilities > CVE-2002-0371
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 11 | |
Application | 1 |
Exploit-Db
description | MS IE 5/6,MS ISA Server 2000,MS Proxy Server 2.0 Gopher Client Buffer Overflow. CVE-2002-0371 . Remote exploit for windows platform |
id | EDB-ID:21510 |
last seen | 2016-02-02 |
modified | 2002-07-27 |
published | 2002-07-27 |
reporter | [email protected] |
source | https://www.exploit-db.com/download/21510/ |
title | Microsoft Internet Explorer 5/6, Microsoft ISA Server 2000, Microsoft Proxy Server 2.0 Gopher Client - Buffer Overflow |
Nessus
NASL family | Firewalls |
NASL id | PROXY_GOPHER.NASL |
description | Gopher is an old network protocol which predates HTTP and is nearly unused today. As a result, gopher-compatible software is generally less audited and more likely to contain security bugs than others. By making gopher requests, an attacker may evade your firewall settings, by making connections to port 70, or may even exploit arcane flaws in this protocol to gain more privileges on this host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11305 |
published | 2003-03-02 |
reporter | This script is Copyright (C) 2003-2020 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11305 |
title | HTTP Proxy Open gopher:// Request Relaying |
code |
|
Oval
accepted | 2014-02-24T04:03:28.963-05:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response. | ||||||||||||
family | windows | ||||||||||||
id | oval:org.mitre.oval:def:98 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2003-11-12T05:00:00.000-04:00 | ||||||||||||
title | Gopher Client Buffer Overflow | ||||||||||||
version | 66 |
References
- http://online.securityfocus.com/archive/1/276848
- http://www.kb.cert.org/vuls/id/440275
- http://www.pivx.com/workaround_fail.html
- http://www.iss.net/security_center/static/9247.php
- http://www.securityfocus.com/bid/4930
- http://marc.info/?l=bugtraq&m=102397955217618&w=2
- http://marc.info/?l=bugtraq&m=102320516707940&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A98
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-027