Blue Coat Systems Inc. WinProxy before 6.1a allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of packets with 0xFF characters to the Telnet port (TCP 23), which corrupts the heap.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18288 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/322 - | |
References | () http://securitytracker.com/id?1015442 - Patch | |
References | () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=365 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/16149 - | |
References | () http://www.vupen.com/english/advisories/2006/0065 - | |
References | () http://www.winproxy.com/products/relnotes.asp - |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3654
Mitre link : CVE-2005-3654
CVE.ORG link : CVE-2005-3654
JSON object : View
Products Affected
bluecoat
- webproxy
CWE