Buffer overflow in k9filter.exe in BlueCoat K9 Web Protection 3.2.36, and probably other versions before 3.2.44, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request to port 2372.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securitytracker.com/id?1018210 | vdb-entry x_refsource_SECTRACK |
| http://www.securityfocus.com/archive/1/470836/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.vupen.com/english/advisories/2007/2104 | vdb-entry x_refsource_VUPEN |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/34773 | vdb-entry x_refsource_XF |
| http://osvdb.org/37186 | vdb-entry x_refsource_OSVDB |
| http://www.csis.dk/dk/forside/Bluecoat-k9.pdf | x_refsource_MISC |
| http://www.kb.cert.org/vuls/id/271601 | third-party-advisory x_refsource_CERT-VN |
| http://www.securityfocus.com/bid/24373 | vdb-entry x_refsource_BID |
| http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063848.html | mailing-list x_refsource_FULLDISC |
| http://secunia.com/advisories/25593 | third-party-advisory x_refsource_SECUNIA |
| http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0190.html | mailing-list x_refsource_FULLDISC |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|