Vulnerability Description
Buffer overflow in the HTTP proxy service for 3proxy 0.5 to 0.5.3g, and 0.6b-devel before 20070413, might allow remote attackers to execute arbitrary code via crafted transparent requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 3Proxy | 3Proxy | <= 0.5.3g |
References
- http://3proxy.ru/0.5.3h/Changelog.txtPatch
- http://secunia.com/advisories/24961
- http://secunia.com/advisories/25001
- http://security.gentoo.org/glsa/glsa-200704-17.xml
- http://www.securityfocus.com/archive/1/466650/100/100/threaded
- http://www.securityfocus.com/bid/23545
- http://www.vupen.com/english/advisories/2007/1442
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33841
- http://3proxy.ru/0.5.3h/Changelog.txtPatch
- http://secunia.com/advisories/24961
- http://secunia.com/advisories/25001
- http://security.gentoo.org/glsa/glsa-200704-17.xml
- http://www.securityfocus.com/archive/1/466650/100/100/threaded
- http://www.securityfocus.com/bid/23545
- http://www.vupen.com/english/advisories/2007/1442
FAQ
What is CVE-2007-2031?
CVE-2007-2031 is a vulnerability with a CVSS score of 10.0 (HIGH). Buffer overflow in the HTTP proxy service for 3proxy 0.5 to 0.5.3g, and 0.6b-devel before 20070413, might allow remote attackers to execute arbitrary code via crafted transparent requests.
How severe is CVE-2007-2031?
CVE-2007-2031 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2031?
Check the references section above for vendor advisories and patch information. Affected products include: 3Proxy 3Proxy.