HTTP: Wingate Proxy Overflow

This signature detects attempts to exploit a known vulnerability in the WinGate 6.1.1. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server. The attack consists of a simple buffer overflow in the URL, this might false positive on Web applications with long variables.

Extended Description

Qbik WinGate is susceptible to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue allows remote attackers to execute arbitrary machine code in the context of affected proxy servers. This facilitates the remote compromise of affected computers. Failed exploit attempts will crash the proxy server, denying service to legitimate users. Version 6.1.1.1077 is vulnerable to this issue; other versions may also be affected.

Affected Products

Qbik wingate

References

BugTraq: 61130 18312

CVE: CVE-2006-2926

Short Name
HTTP:PROXY:WINGATE-OF
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2006-2926 CVE-2013-5019 Overflow Proxy Wingate bid:18312 bid:61130
Release Date
03/24/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Occasionally
Vendors

Qbik

CVSS Score

7.5

10.0

Found a potential security threat?