Skip navigation

AnalogX Proxy Server Vulnerable to DoS Attack

 

Reported November 15, 2000 by Network Security Solutions Inc.

VERSIONS AFFECTED
  • Analog X Proxy Server 4.10

DESCRIPTION

By sending multiple abnormal strings to either the FTP, SMTP, POP, or Proxy Logger services a malicious user could cause the Proxy server to stop functioning and the system to require a reboot.

The following is sample logfile output from an attacked Analog X Proxy Server;


    FTP Service error msg.:               
                    ABORT: Last String too large for Buffer (1509 > 1024)                       
                                (log.c/114)
  
   POP3 Service error msg.:              
                           ABORT: Last String too large for Buffer (1509 > 1024)                        
                                       (log.c/114)  
 SMTP Service error msg.:                
                   ABORT: Last String too large for Buffer (10301 > 1024)
                        (log.c/114)

Services such as HTTP, SOCKS, and NNTP are not effected.

VENDOR RESPONSE

The vendor has been notified but no patch has be released. 

CREDIT
Discovered by
NSS Inc.

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish