[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] CSIS Advisory: BlueCoat K9 Web Protection 3.2.36 Overflow
- To: "Jared DeMott" <demottja@xxxxxxx>
- Subject: Re: [Full-disclosure] CSIS Advisory: BlueCoat K9 Web Protection 3.2.36 Overflow
- From: "Dennis Rand" <rand@xxxxxxx>
- Date: Fri, 8 Jun 2007 20:57:22 +0200
Hey Jared
It does not matter when what was discovered as long as it got fixed J
Best regards
Dennis
Fra: Jared DeMott [mailto:demottja@xxxxxxx]
Sendt: 8. juni 2007 19:04
Til: Dennis Rand
Cc: full-disclosure@xxxxxxxxxxxxxxxxx
Emne: Re: [Full-disclosure] CSIS Advisory: BlueCoat K9 Web Protection
3.2.36 Overflow
Dennis Rand wrote:
CSIS Security Group has discovered a remote exploitable arbitrary
overwrite, in the Blue Coat
K9 Web Protection local Web configuration manager on 127.0.0.1 and port
2372.
Justin Seitz of VDA Labs (www.vdalabs.com) already found this bug.
Here's the CVE: CVE-2007-1783.
They had so many bugs, they're rolling this issue and more into the
next release.
We have a working PoC, and believe it could be transformed into remote
via embedded link. For example:
<SCRIPT SRC="http://127.0.0.1:2372/<buffer here>
<http://127.0.0.1:2372/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAA> "></SCRIPT>
Blessings,
Jared
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/