Blue Coat Systems Inc. WinProxy before 6.1a allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of packets with 0xFF characters to the Telnet port (TCP 23), which corrupts the heap.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Webproxy | Bluecoat | 4.0-r1a (including) | 4.0-r1a (including) |
Webproxy | Bluecoat | 4.0-r1b (including) | 4.0-r1b (including) |
Webproxy | Bluecoat | 4.0-r1c (including) | 4.0-r1c (including) |
Webproxy | Bluecoat | 4.0-r1e (including) | 4.0-r1e (including) |
Webproxy | Bluecoat | 4.0-r1f (including) | 4.0-r1f (including) |
Webproxy | Bluecoat | 4.0-r1h (including) | 4.0-r1h (including) |
Webproxy | Bluecoat | 4.0-r1k (including) | 4.0-r1k (including) |
Webproxy | Bluecoat | 4.0-r1m (including) | 4.0-r1m (including) |
Webproxy | Bluecoat | 4.0-r1n (including) | 4.0-r1n (including) |
Webproxy | Bluecoat | 4.0-r1p (including) | 4.0-r1p (including) |
Webproxy | Bluecoat | 5.0-r1a (including) | 5.0-r1a (including) |
Webproxy | Bluecoat | 5.0-r1b (including) | 5.0-r1b (including) |
Webproxy | Bluecoat | 5.0-r1c (including) | 5.0-r1c (including) |
Webproxy | Bluecoat | 5.1-r1a (including) | 5.1-r1a (including) |
Webproxy | Bluecoat | 5.1-r1d (including) | 5.1-r1d (including) |
Webproxy | Bluecoat | 5.1-r1e (including) | 5.1-r1e (including) |
Webproxy | Bluecoat | 5.2-r1a (including) | 5.2-r1a (including) |
Webproxy | Bluecoat | 6.0-r1a (including) | 6.0-r1a (including) |
Webproxy | Bluecoat | 6.0-r1c (including) | 6.0-r1c (including) |