blob: 98471006e4758bfec65861678780afea267cc1bd [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200411-07">
<title>Proxytunnel: Format string vulnerability</title>
Proxytunnel is vulnerable to a format string vulnerability, potentially
allowing a remote server to execute arbitrary code with the rights of the
Proxytunnel process.
<product type="ebuild">Proxytunnel</product>
<announced>November 03, 2004</announced>
<revised>November 03, 2004: 01</revised>
<package name="net-misc/proxytunnel" auto="yes" arch="*">
<unaffected range="ge">1.2.3</unaffected>
<vulnerable range="lt">1.2.3</vulnerable>
Proxytunnel is a program that tunnels connections to a remote server
through a standard HTTPS proxy.
Florian Schilhabel of the Gentoo Linux Security Audit project found a
format string vulnerability in Proxytunnel. When the program is started in
daemon mode (-a [port]), it improperly logs invalid proxy answers to
<impact type="normal">
A malicious remote server could send specially-crafted invalid answers to
exploit the format string vulnerability, potentially allowing the execution
of arbitrary code on the tunnelling host with the rights of the Proxytunnel
You can mitigate the issue by only allowing connections to trusted remote
All Proxytunnel users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3"</code>
<uri link="">CAN-2004-0992</uri>
<uri link="">Proxytunnel News</uri>
<metadata tag="requester" timestamp="Tue, 2 Nov 2004 21:56:56 +0000">
<metadata tag="submitter" timestamp="Wed, 3 Nov 2004 09:32:39 +0000">
<metadata tag="bugReady" timestamp="Wed, 3 Nov 2004 14:02:21 +0000">