CVE-2007-2952
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple stack-based buffer overflows in the filter service (aka k9filter.exe) in Blue Coat K9 Web Protection 3.2.44 with Filter 3.2.32 allow (1) remote attackers to execute arbitrary code via a long HTTP Referer header to the K9 Web Protection Administration interface and (2) man-in-the-middle attackers to execute arbitrary code via an HTTP response with a long HTTP version field.
Múltiples desbordamientos de búfer basados en pila del servicio de filtros (aka k9filter.exe)
en Blue Coat K9 Web Protection 3.2.44 con Filter 3.2.32 permite (1) a atacantes remotos ejecutar código arbitrariamente mediante una cabecera larga HTTP Referer al interfaz web K9 Web Protection Administration y (2) a los atacantes "man-in-the-middle" ejecutar código de su elección a través de una respuesta con una versión de campo HTTP larga.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-05-31 CVE Reserved
- 2008-07-31 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/494975/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/494984/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/30463 | Vdb Entry | |
http://www.securityfocus.com/bid/30464 | Vdb Entry | |
http://www.securitytracker.com/id?1020587 | Vdb Entry | |
http://www.securitytracker.com/id?1020588 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/2263/references | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44123 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44124 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/25813 | 2018-10-16 | |
http://secunia.com/secunia_research/2007-61/advisory | 2018-10-16 | |
http://secunia.com/secunia_research/2007-64/advisory | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Blue Coat Systems Search vendor "Blue Coat Systems" | Filter Search vendor "Blue Coat Systems" for product "Filter" | 3.2.32 Search vendor "Blue Coat Systems" for product "Filter" and version "3.2.32" | - |
Affected
| ||||||
Blue Coat Systems Search vendor "Blue Coat Systems" | K9 Web Protection Search vendor "Blue Coat Systems" for product "K9 Web Protection" | 3.2.44 Search vendor "Blue Coat Systems" for product "K9 Web Protection" and version "3.2.44" | - |
Affected
|