Vulnerabilities > CVE-2005-4085 - Remote Host Header Buffer Overflow vulnerability in Bluecoat Proxyav and Webproxy

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
bluecoat
nessus
exploit available
metasploit

Summary

Buffer overflow in BlueCoat (a) WinProxy before 6.1a and (b) the web console access functionality in ProxyAV before 2.4.2.3 allows remote attackers to execute arbitrary code via a long Host: header.

Exploit-Db

  • descriptionBlueCoat WinProxy 6.0 R1c (Host) Remote Stack/SEH Overflow Exploit. CVE-2005-4085. Remote exploit for windows platform
    idEDB-ID:1408
    last seen2016-01-31
    modified2006-01-07
    published2006-01-07
    reporterFistFuXXer
    sourcehttps://www.exploit-db.com/download/1408/
    titleBlueCoat WinProxy 6.0 R1c Host Remote Stack/SEH Overflow Exploit
  • descriptionBlue Coat WinProxy Host Header Overflow. CVE-2005-4085. Remote exploit for windows platform
    idEDB-ID:16691
    last seen2016-02-02
    modified2010-07-12
    published2010-07-12
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16691/
    titleBlue Coat WinProxy Host Header Overflow

Metasploit

descriptionThis module exploits a buffer overflow in the Blue Coat Systems WinProxy service by sending a long port value for the Host header in a HTTP request.
idMSF:EXPLOIT/WINDOWS/PROXY/BLUECOAT_WINPROXY_HOST
last seen2020-06-01
modified2017-07-24
published2006-01-08
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/proxy/bluecoat_winproxy_host.rb
titleBlue Coat WinProxy Host Header Overflow

Nessus

  • NASL familyFirewalls
    NASL idWINPROXY_61A.NASL
    descriptionThe remote host is running WinProxy, a proxy server for Windows. According to the Windows registry, the installed version of WinProxy suffers from denial of service and buffer overflow vulnerabilities in its telnet and web proxy servers. An attacker may be able to exploit these issues to crash the proxy or even execute arbitrary code on the affected host.
    last seen2020-06-01
    modified2020-06-02
    plugin id20393
    published2006-01-10
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20393
    titleWinProxy < 6.1a Multiple Vulnerabilities (credentialed check)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    
    include("compat.inc");
    
    if (description) {
      script_id(20393);
      script_version("1.14");
    
      script_cve_id("CVE-2005-3187", "CVE-2005-3654", "CVE-2005-4085");
      script_bugtraq_id(16147, 16148, 16149);
    
      script_name(english:"WinProxy < 6.1a Multiple Vulnerabilities (credentialed check)");
      script_summary(english:"Checks for multiple vulnerabilities in WinProxy < 6.1a");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote proxy is affected by multiple vulnerabilities." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running WinProxy, a proxy server for Windows. 
    
    According to the Windows registry, the installed version of WinProxy
    suffers from denial of service and buffer overflow vulnerabilities in
    its telnet and web proxy servers.  An attacker may be able to exploit
    these issues to crash the proxy or even execute arbitrary code on the
    affected host." );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?40f07cd6" );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3a6c81a5" );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?79b3006b" );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8c88612f" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to WinProxy version 6.1a or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"metasploit_name", value:'Blue Coat WinProxy Host Header Overflow');
     script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/01/10");
     script_set_attribute(attribute:"patch_publication_date", value: "2006/01/05");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/01/05");
     script_cvs_date("Date: 2018/08/06 14:03:14");
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_end_attributes();
    
     
      script_category(ACT_GATHER_INFO);
      script_family(english:"Firewalls");
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_dependencies("smb_hotfixes.nasl");
      script_require_keys("SMB/Registry/Enumerated");
      script_require_ports(139, 445);
    
      exit(0);
    }
    
    
    if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);
    
    
    # Look in the registry for evidence of WinProxy.
    name = get_kb_item("SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/WinProxy 6/DisplayName");
    if (name && name =~ "^WinProxy \(Version ([0-5]\.|6\.0)") {
      security_hole(0);
      exit(0);
    }
    
    
  • NASL familyFirewalls
    NASL idWINPROXY_HTTP_61A.NASL
    descriptionThe remote host is running WinProxy, a proxy server for Windows. The installed version of WinProxy
    last seen2020-06-01
    modified2020-06-02
    plugin id20391
    published2006-01-10
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20391
    titleWinProxy < 6.1a HTTP Proxy Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description) {
      script_id(20391);
      script_version("1.19");
    
      script_cve_id("CVE-2005-3187", "CVE-2005-4085");
      script_bugtraq_id(16147, 16148);
    
      script_name(english:"WinProxy < 6.1a HTTP Proxy Multiple Vulnerabilities");
      script_summary(english:"Checks for multiple vulnerabilities in WinProxy < 6.1a HTTP Proxy");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote web proxy server is affected by denial of service and
    buffer overflow vulnerabilities." );
     script_set_attribute(attribute:"description", value:
    "The remote host is running WinProxy, a proxy server for Windows. 
    
    The installed version of WinProxy's HTTP proxy fails to handle long
    requests as well as requests with long Host headers.  An attacker may
    be able to exploit these issues to crash the proxy or even execute
    arbitrary code on the affected host." );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?40f07cd6" );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3a6c81a5" );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8c88612f" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to WinProxy version 6.1a or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
     script_set_attribute(attribute:"metasploit_name", value:'Blue Coat WinProxy Host Header Overflow');
     script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/01/10");
     script_set_attribute(attribute:"patch_publication_date", value: "2006/01/05");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/01/05");
     script_cvs_date("Date: 2018/08/06 14:03:14");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
     
      script_category(ACT_DENIAL);
      script_family(english:"Firewalls");
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_dependencies("find_service2.nasl", "httpver.nasl");
      script_require_ports("Services/www", 80);
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    port = get_http_port(default:80, dont_break: 1);
    
    
    # Make sure it looks like WinProxy.
    help = get_kb_banner(port: port, type: "help");
    if (help && "Proxy-agent: BlueCoat-WinProxy" >< help) {
      # Flag it as a proxy.
      register_service(port:port, ipproto:"tcp", proto:"http_proxy");
    
      # Try to exploit it.
      rq = http_mk_proxy_request(port: 80, item: "/", host: "127.0.0.1", method: "GET", scheme: "http", version: 10, add_headers: make_array("Host", crap(32800)));
    
      w = http_send_recv_req(port: port, req: rq);
      # If we didn't get anything, try resending the query.
      w = http_send_recv3(port: port, item:"/", method:"GET");
    
      # There's a problem if we didn't get a response the second time.
        if (isnull(w)) security_hole(port);
    }
    

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83192/bluecoat_winproxy_host.rb.txt
idPACKETSTORM:83192
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83192/Blue-Coat-WinProxy-Host-Header-Overflow.html
titleBlue Coat WinProxy Host Header Overflow

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:13614
last seen2017-11-19
modified2006-01-07
published2006-01-07
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-13614
titleBlueCoat WinProxy 6.0 R1c (Host) Remote Stack/SEH Overflow Exploit