First published: Fri Aug 01 2008(Updated: )
Multiple stack-based buffer overflows in the filter service (aka k9filter.exe) in Blue Coat K9 Web Protection 3.2.44 with Filter 3.2.32 allow (1) remote attackers to execute arbitrary code via a long HTTP Referer header to the K9 Web Protection Administration interface and (2) man-in-the-middle attackers to execute arbitrary code via an HTTP response with a long HTTP version field.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Blue Coat Systems Filter | =3.2.32 | |
Blue Coat K9 Web Protection | =3.2.44 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2952 is classified as having a high severity due to the potential for remote code execution.
To fix CVE-2007-2952, upgrade to the latest version of Blue Coat K9 Web Protection or apply the appropriate patches provided by the vendor.
CVE-2007-2952 affects users of Blue Coat K9 Web Protection version 3.2.44 and Filter version 3.2.32.
CVE-2007-2952 can be exploited by remote attackers through crafted HTTP Referer headers, potentially allowing arbitrary code execution.
Currently, the best workaround for CVE-2007-2952 is to restrict access to the K9 Web Protection Administration interface or implement network security measures to block untrusted requests.