ID

VAR-200203-0081


CVE

CVE-2002-0133


TITLE

Avirt Gateway Suite HTTP Proxy Remote Buffer Overflow Vulnerability

Trust: 0.9

sources: BID: 3904 // CNNVD: CNNVD-200203-083

DESCRIPTION

Buffer overflows in Avirt Gateway Suite 4.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long header fields to the HTTP proxy, or (2) a long string to the telnet proxy. Avirt Gateway Suite is a product combining the functionality of Avirt Gateway and Avirt Mail. It is designed as a single solution for collection of client machines sharing a single internet connection. It is available for the Microsoft Windows operating system. The Gateway Suite includes an HTTP proxy which resides on port 8080 by default. There is also a possibility that this buffer overflow could be used to execute arbitrary code with SYSTEM level privileges

Trust: 1.53

sources: NVD: CVE-2002-0133 // BID: 3904 // BID: 3905 // VULHUB: VHN-4528

AFFECTED PRODUCTS

vendor:avirtmodel:sohoscope:eqversion:4.2

Trust: 2.2

vendor:avirtmodel:gateway suitescope:eqversion:4.2

Trust: 2.2

vendor:avirtmodel:gatewayscope:eqversion:4.2

Trust: 2.2

sources: BID: 3904 // BID: 3905 // CNNVD: CNNVD-200203-083 // NVD: CVE-2002-0133

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0133
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200203-083
value: HIGH

Trust: 0.6

VULHUB: VHN-4528
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2002-0133
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4528
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4528 // CNNVD: CNNVD-200203-083 // NVD: CVE-2002-0133

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0133

THREAT TYPE

network

Trust: 0.6

sources: BID: 3904 // BID: 3905

TYPE

Boundary Condition Error

Trust: 1.2

sources: BID: 3904 // BID: 3905 // CNNVD: CNNVD-200203-083

EXTERNAL IDS

db:NVDid:CVE-2002-0133

Trust: 2.3

db:BIDid:3905

Trust: 2.0

db:BIDid:3904

Trust: 2.0

db:CNNVDid:CNNVD-200203-083

Trust: 0.7

db:XFid:7916

Trust: 0.6

db:XFid:7918

Trust: 0.6

db:BUGTRAQid:20020117 AVIRT PROXY BUFFER OVERFLOW VULNERABILITIES

Trust: 0.6

db:BUGTRAQid:20020212 AVIRT GATEWAY 4.2 REMOTE BUFFER OVERFLOW: PROOF OF CONCEPT

Trust: 0.6

db:BUGTRAQid:20020121 [RESEND] AVIRT GATEWAY TELNET VULNERABILITY (AND MORE?)

Trust: 0.6

db:BUGTRAQid:20020220 AVIRT 4.2 QUESTION

Trust: 0.6

db:VULHUBid:VHN-4528

Trust: 0.1

sources: VULHUB: VHN-4528 // BID: 3904 // BID: 3905 // CNNVD: CNNVD-200203-083 // NVD: CVE-2002-0133

REFERENCES

url:http://www.securityfocus.com/bid/3904

Trust: 1.7

url:http://www.securityfocus.com/bid/3905

Trust: 1.7

url:http://online.securityfocus.com/archive/1/251055

Trust: 1.7

url:http://www.iss.net/security_center/static/7916.php

Trust: 1.7

url:http://www.iss.net/security_center/static/7918.php

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=101424723728817&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=101164598828092&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=101366658112809&w=2

Trust: 1.0

url:http://www.avirt.com/index.html

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=101424723728817&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=101366658112809&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=101164598828092&w=2

Trust: 0.6

url:http://marc.info/?l=bugtraq&m=101164598828092&w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&m=101366658112809&w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&m=101424723728817&w=2

Trust: 0.1

sources: VULHUB: VHN-4528 // BID: 3904 // BID: 3905 // CNNVD: CNNVD-200203-083 // NVD: CVE-2002-0133

CREDITS

Posted to the BugTraq mailing list by Strumpf Noir Society <vuln-dev@labs.secureance.com>.

Trust: 0.6

sources: BID: 3904 // BID: 3905

SOURCES

db:VULHUBid:VHN-4528
db:BIDid:3904
db:BIDid:3905
db:CNNVDid:CNNVD-200203-083
db:NVDid:CVE-2002-0133

LAST UPDATE DATE

2025-04-03T22:30:56.591000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4528date:2016-10-18T00:00:00
db:BIDid:3904date:2009-07-11T09:56:00
db:BIDid:3905date:2009-07-11T09:56:00
db:CNNVDid:CNNVD-200203-083date:2006-09-05T00:00:00
db:NVDid:CVE-2002-0133date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-4528date:2002-03-25T00:00:00
db:BIDid:3904date:2002-01-18T00:00:00
db:BIDid:3905date:2002-01-18T00:00:00
db:CNNVDid:CNNVD-200203-083date:2002-01-18T00:00:00
db:NVDid:CVE-2002-0133date:2002-03-25T05:00:00