Vulnerability Description
Buffer overflow in Anon Proxy Server 0.102 and earlier, when user authentication is enabled, allows remote attackers to cause a denial of service (exception) via a user name with a large number of quotes, which triggers the overflow during escaping.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Anon Proxy Server | Anon Proxy Server | <= 0.102 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/3618
- http://www.securityfocus.com/archive/1/487446/100/0/threaded
- http://www.securityfocus.com/bid/27593Patch
- https://sourceforge.net/project/shownotes.php?group_id=138780&release_id=571924Patch
- http://securityreason.com/securityalert/3618
- http://www.securityfocus.com/archive/1/487446/100/0/threaded
- http://www.securityfocus.com/bid/27593Patch
- https://sourceforge.net/project/shownotes.php?group_id=138780&release_id=571924Patch
FAQ
What is CVE-2008-0633?
CVE-2008-0633 is a vulnerability with a CVSS score of 6.0 (MEDIUM). Buffer overflow in Anon Proxy Server 0.102 and earlier, when user authentication is enabled, allows remote attackers to cause a denial of service (exception) via a user name with a large number of quo...
How severe is CVE-2008-0633?
CVE-2008-0633 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0633?
Check the references section above for vendor advisories and patch information. Affected products include: Anon Proxy Server Anon Proxy Server.