CVE-2006-0578
CVSS7.5
发布时间 :2006-02-07 20:02:00
修订时间 :2011-03-07 21:30:21
NMCO    

[原文]Blue Coat Proxy Security Gateway OS (SGOS) 4.1.2.1 does not enforce CONNECT rules when using Deep Content Inspection, which allows remote attackers to bypass connection filters.


[CNNVD]Blue Coat Proxy Security Gateway OS 安全绕过漏洞(CNNVD-200602-086)

        Blue Coat Proxy Security Gateway OS (SGOS) 4.1.2.1在使用深度内容检测时没有执行CONNECT规则,这使得远程攻击者可以绕过连接过滤器。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0578
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0578
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200602-086
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/0401
(UNKNOWN)  VUPEN  ADV-2006-0401
http://www.secumind.net/content/french/modules/news/article.php?storyid=8
(VENDOR_ADVISORY)  MISC  http://www.secumind.net/content/french/modules/news/article.php?storyid=8
http://secunia.com/advisories/18622
(VENDOR_ADVISORY)  SECUNIA  18622
http://xforce.iss.net/xforce/xfdb/24446
(UNKNOWN)  XF  proxysg-connect-bypass-security(24446)
http://www.osvdb.org/22853
(UNKNOWN)  OSVDB  22853
http://www.bluecoat.com/support/knowledge/advisory_connect_denial_ignore.html
(UNKNOWN)  CONFIRM  http://www.bluecoat.com/support/knowledge/advisory_connect_denial_ignore.html
http://securitytracker.com/id?1015644
(UNKNOWN)  SECTRACK  1015644

- 漏洞信息

Blue Coat Proxy Security Gateway OS 安全绕过漏洞
高危 未知
2006-02-07 00:00:00 2006-02-08 00:00:00
远程  
        Blue Coat Proxy Security Gateway OS (SGOS) 4.1.2.1在使用深度内容检测时没有执行CONNECT规则,这使得远程攻击者可以绕过连接过滤器。

- 公告与补丁

        

- 漏洞信息

22853
Blue Coat ProxySG SGOS HTTP Proxy Arbitrary Port Connection
Remote / Network Access Infrastructure
Loss of Integrity
Exploit Public

- 漏洞描述

ProxySG SGOS contains a flaw that may allow a remote malicious user to bypass proxy restrictions. The issue is triggered when processing a "CONNECT" method sent to an arbitrary port. It is possible that the flaw may result in a loss of integrity.

- 时间线

2006-02-01 Unknow
2006-02-01 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue, though the vendor has announced this issue to be fixed in future version 4.1.4. It is possible to correct the flaw by implementing the following workaround(s): Write a Visual Policy Manager rule that blocks the CONNECT method to any port other than 443.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站