First published: Tue May 29 2007(Updated: )
Multiple stack-based buffer overflows in the SOCKS proxy support (sockd) in Sun Java Web Proxy Server before 4.0.5 allow remote attackers to execute arbitrary code via crafted packets during protocol negotiation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Sun Java System Web Proxy Server | <=4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2881 is categorized as a high severity vulnerability due to its potential for remote code execution.
To address CVE-2007-2881, upgrade the Sun Java System Web Proxy Server to version 4.0.5 or later.
CVE-2007-2881 affects Sun Java System Web Proxy Server versions prior to 4.0.5.
CVE-2007-2881 involves remote attackers exploiting stack-based buffer overflows through crafted packets.
Yes, CVE-2007-2881 can be exploited remotely, making it possible for attackers on the same local network to execute arbitrary code.