Vulnerabilities > CVE-2004-2416 - Unspecified vulnerability in Youngzsoft Ccproxy 6.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the logging component of CCProxy allows remote attackers to execute arbitrary code via a long HTTP GET request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description CCProxy. CVE-2004-2416. Remote exploit for windows platform id EDB-ID:16689 last seen 2016-02-02 modified 2010-04-30 published 2010-04-30 reporter metasploit source https://www.exploit-db.com/download/16689/ title CCProxy <= 6.2 - Telnet Proxy Ping Overflow description CCProxy Log Remote Stack Overflow Exploit. CVE-2004-2416. Remote exploit for windows platform id EDB-ID:619 last seen 2016-01-31 modified 2004-11-09 published 2004-11-09 reporter Ruder source https://www.exploit-db.com/download/619/ title CCProxy Log Remote Stack Overflow Exploit
Metasploit
description | This module exploits the YoungZSoft CCProxy <= v6.2 suite Telnet service. The stack is overwritten when sending an overly long address to the 'ping' command. |
id | MSF:EXPLOIT/WINDOWS/PROXY/CCPROXY_TELNET_PING |
last seen | 2020-06-01 |
modified | 2017-11-08 |
published | 2007-09-09 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2416 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/proxy/ccproxy_telnet_ping.rb |
title | CCProxy Telnet Proxy Ping Overflow |
Nessus
NASL family | Web Servers |
NASL id | CCPROXY_OVERFLOW.NASL |
description | The version of CCProxy running on the remote host has a buffer overflow vulnerability. This issue is triggered by sending a long HTTP GET request. A remote attacker could exploit this issue to crash the service, or potentially execute arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15774 |
published | 2004-11-20 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15774 |
title | CCProxy Logging Compoent HTTP GET Request Remote Overflow |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/83074/ccproxy_telnet_ping.rb.txt id PACKETSTORM:83074 last seen 2016-12-05 published 2009-11-26 reporter Patrick Webster source https://packetstormsecurity.com/files/83074/CCProxy-v6.2-Telnet-Proxy-Ping-Overflow.html title CCProxy <= v6.2 Telnet Proxy Ping Overflow data source https://packetstormsecurity.com/files/download/59050/ccproxy-meta.txt id PACKETSTORM:59050 last seen 2016-12-05 published 2007-09-05 reporter Patrick Webster source https://packetstormsecurity.com/files/59050/ccproxy-meta.txt.html title ccproxy-meta.txt
References
- http://secunia.com/advisories/13085
- http://secunia.com/advisories/13085
- http://securitytracker.com/id?1012189
- http://securitytracker.com/id?1012189
- http://www.osvdb.org/11593
- http://www.osvdb.org/11593
- http://www.securiteam.com/exploits/6E0032KBPM.html
- http://www.securiteam.com/exploits/6E0032KBPM.html
- http://www.securityfocus.com/bid/11666
- http://www.securityfocus.com/bid/11666
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18012
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18012