Vulnerabilities > CVE-2006-2926 - Unspecified vulnerability in Qbik Wingate 6.1.1.1077
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in the WWW Proxy Server of Qbik WinGate 6.1.1.1077 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long URL HTTP request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description Qbik WinGate WWW Proxy Server URL Processing Overflow. CVE-2006-2926. Remote exploit for windows platform id EDB-ID:16690 last seen 2016-02-02 modified 2010-09-20 published 2010-09-20 reporter metasploit source https://www.exploit-db.com/download/16690/ title Qbik WinGate WWW Proxy Server URL Processing Overflow description QBik Wingate 6.1.1.1077 (POST) Remote Buffer Overflow Exploit. CVE-2006-2926. Remote exploit for windows platform id EDB-ID:1885 last seen 2016-01-31 modified 2006-06-07 published 2006-06-07 reporter kingcope source https://www.exploit-db.com/download/1885/ title QBik Wingate 6.1.1.1077 POST Remote Buffer Overflow Exploit
Metasploit
description | This module exploits a stack buffer overflow in Qbik WinGate version 6.1.1.1077 and earlier. By sending malformed HTTP POST URL to the HTTP proxy service on port 80, a remote attacker could overflow a buffer and execute arbitrary code. |
id | MSF:EXPLOIT/WINDOWS/PROXY/QBIK_WINGATE_WWWPROXY |
last seen | 2020-01-25 |
modified | 2017-11-08 |
published | 2010-02-18 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2926 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/proxy/qbik_wingate_wwwproxy.rb |
title | Qbik WinGate WWW Proxy Server URL Processing Overflow |
Nessus
NASL family | Windows |
NASL id | WINGATE_613.NASL |
description | The remote host appears to be running WinGate Proxy Server, a Windows application for managing and securing Internet access. According to its banner, the version of WinGate installed on the remote host is affected by a buffer overflow vulnerability in its HTTP proxy service. An attacker with access to use the proxy may be able to exploit this issue to execute arbitrary code on the remote host. Note that by default the service operates with LOCAL SYSTEM privileges, which means that a successful attack may result in a complete compromise of the affected system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21674 |
published | 2006-06-09 |
reporter | This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/21674 |
title | WinGate POST Request Buffer Overflow |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/86449/qbik_wingate_wwwproxy.rb.txt |
id | PACKETSTORM:86449 |
last seen | 2016-12-05 |
published | 2010-02-19 |
reporter | patrick |
source | https://packetstormsecurity.com/files/86449/Qbik-WinGate-WWW-Proxy-Server-URL-Processing-Overflow.html |
title | Qbik WinGate WWW Proxy Server URL Processing Overflow |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046646.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046646.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046649.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046649.html
- http://secunia.com/advisories/20483
- http://secunia.com/advisories/20483
- http://securitytracker.com/id?1016239
- http://securitytracker.com/id?1016239
- http://www.securityfocus.com/bid/18312
- http://www.securityfocus.com/bid/18312
- http://www.vupen.com/english/advisories/2006/2182
- http://www.vupen.com/english/advisories/2006/2182
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26970
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26970