Vulnerabilities > CVE-2007-2031 - Buffer Overflow vulnerability in 3proxy HTTP Proxy Request

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
3proxy
critical
nessus
exploit available

Summary

Buffer overflow in the HTTP proxy service for 3proxy 0.5 to 0.5.3g, and 0.6b-devel before 20070413, might allow remote attackers to execute arbitrary code via crafted transparent requests.

Vulnerable Configurations

Part Description Count
Application
3Proxy
1

Exploit-Db

  • description3proxy 0.5.3g proxy.c logurl() Remote Overflow Exploit (exec-shield). CVE-2007-2031. Remote exploit for linux platform
    idEDB-ID:3829
    last seen2016-01-31
    modified2007-05-02
    published2007-05-02
    reporterXpl017Elz
    sourcehttps://www.exploit-db.com/download/3829/
    title3proxy 0.5.3g proxy.c logurl Remote Overflow Exploit exec-shield
  • description3proxy 0.5.3g proxy.c logurl() Remote Buffer Overflow Exploit (linux). CVE-2007-2031. Remote exploit for linux platform
    idEDB-ID:3821
    last seen2016-01-31
    modified2007-04-30
    published2007-04-30
    reportervade79
    sourcehttps://www.exploit-db.com/download/3821/
    title3proxy 0.5.3g proxy.c logurl Remote Buffer Overflow Exploit linux

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200704-17.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200704-17 (3proxy: Buffer overflow) The 3proxy development team reported a buffer overflow in the logurl() function when processing overly long requests. Impact : A remote attacker could send a specially crafted transparent request to the proxy, resulting in the execution of arbitrary code with privileges of the user running 3proxy. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id25105
    published2007-04-30
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/25105
    titleGLSA-200704-17 : 3proxy: Buffer overflow
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 200704-17.
    #
    # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(25105);
      script_version("1.13");
      script_cvs_date("Date: 2019/08/02 13:32:44");
    
      script_cve_id("CVE-2007-2031");
      script_xref(name:"GLSA", value:"200704-17");
    
      script_name(english:"GLSA-200704-17 : 3proxy: Buffer overflow");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-200704-17
    (3proxy: Buffer overflow)
    
        The 3proxy development team reported a buffer overflow in the logurl()
        function when processing overly long requests.
      
    Impact :
    
        A remote attacker could send a specially crafted transparent request to
        the proxy, resulting in the execution of arbitrary code with privileges
        of the user running 3proxy.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/200704-17"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All 3proxy users should upgrade to the latest version:
        # emerge --sync
        # emerge --ask --oneshot --verbose '>=net-proxy/3proxy-0.5.3h'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:3proxy");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/04/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/04/30");
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/04/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"net-proxy/3proxy", unaffected:make_list("ge 0.5.3h"), vulnerable:make_list("lt 0.5.3h"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "3proxy");
    }
    
  • NASL familyFirewalls
    NASL id3PROXY_LOGURL_OVERFLOW.NASL
    descriptionThe remote host is running 3proxy, an application proxy supporting many protocols (Telnet, FTP, WWW, and more). A stack overflow vulnerability has been detected in 3proxy prior to 0.5.3h and 0.6b-devel before 20070413. By sending a long host header in HTTP GET request, a remote attacker could overflow a buffer and execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id31094
    published2008-02-14
    reporterThis script is Copyright (C) 2008-2018 Marcin Kozlowski
    sourcehttps://www.tenable.com/plugins/nessus/31094
    title3Proxy HTTP Proxy Crafted Transparent Request Remote Overflow