7.8 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.097 Low
EPSS
Percentile
94.8%
Multiple stack-based buffer overflows in the filter service (aka k9filter.exe) in Blue Coat K9 Web Protection 3.2.44 with Filter 3.2.32 allow (1) remote attackers to execute arbitrary code via a long HTTP Referer header to the K9 Web Protection Administration interface and (2) man-in-the-middle attackers to execute arbitrary code via an HTTP response with a long HTTP version field.
secunia.com/advisories/25813
secunia.com/secunia_research/2007-61/advisory/
secunia.com/secunia_research/2007-64/advisory/
www.securityfocus.com/archive/1/494975/100/0/threaded
www.securityfocus.com/archive/1/494984/100/0/threaded
www.securityfocus.com/bid/30463
www.securityfocus.com/bid/30464
www.securitytracker.com/id?1020587
www.securitytracker.com/id?1020588
www.vupen.com/english/advisories/2008/2263/references
exchange.xforce.ibmcloud.com/vulnerabilities/44123
exchange.xforce.ibmcloud.com/vulnerabilities/44124