[NT] MyProxy Firewall Bypassing

From: SecuriTeam (support_at_securiteam.com)
Date: 08/18/05

  • Next message: SecuriTeam: "[EXPL] Microsoft Internet Explorer Msdds.dll Code Execution"
    To: list@securiteam.com
    Date: 18 Aug 2005 14:54:39 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      MyProxy Firewall Bypassing
    ------------------------------------------------------------------------

    SUMMARY

    "MyProxy helps dramatically accelerate your Internet connection, save your
    Internet costs and make your web surfing more enjoyable." It is possible
    to issue MyProxy a CONNECT command that will cause it to connect to any
    TCP port on machines the MyProxy has access to.

    DETAILS

    Vulnerable Systems:
     * MyProxy version 6.58

    Example:
    Proxy IP Address: 5.5.5.5
    The Pop3 Server IP Address : 4.4.4.4
    Connect with "telnet 5.5.5.5 8080" to the proxy and enter: CONNECT
    4.4.4.4:110 / HTTP/1.0

    The response should be the POP3 server banner. Basically this allows you
    to connect to any TCP port on any machine the proxy can connect to.

    Vendor Status:
    Vendor was notified on 22/11/04
    Vendor Response:
    "Yes, but only users listed at the "Users" tab-sheet MyProxy's options can
    access MyProxy and use this feature."

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:gss_it@yahoo.com> GSS IT.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[EXPL] Microsoft Internet Explorer Msdds.dll Code Execution"

    Relevant Pages

    • [NEWS] Everybuddy Vulnerable to a DoS Attack (Long Message)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... sub Message { ... After numerous attempts to contact the vendor (in some cases the vendor ...
      (Securiteam)
    • [NT] OneWorldStore Cross Site Scripting and SQL Injection Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... OneWorldStore is a powerful design ASP ... Vendor provided security update: ...
      (Securiteam)
    • [NT] Buffer Overflow in Knet
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... 17/02/2005 - Vendor Response ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [NT] w3wp DoS
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... 1/12/2006 - Vendor requested for additional info ... recv(conn_socket, szBuffer, 256, 0); ...
      (Securiteam)
    • [NT] Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Trend Micro HouseCall ActiveX Control Arbitrary Code Execution ... The vulnerability is caused due to an implementation error within the ... 18/08/2008 - Vendor notified. ...
      (Securiteam)