header-logo
Suggest Exploit
vendor:
IOS Firewall Authentication Proxy
by:
SecurityFocus
8.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: IOS Firewall Authentication Proxy
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2004-0753
CPE: o:cisco:ios_firewall_authentication_proxy
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: FTP and Telnet
2004

Cisco IOS Firewall Authentication Proxy Buffer Overflow

Cisco IOS Firewall Authentication Proxy is prone to a buffer overflow condition when a malicious user sends a specially crafted FTP or Telnet request with a username of more than 50 characters. This can cause a denial of service or potential execution of arbitrary code.

Mitigation:

Upgrade to the latest version of Cisco IOS Firewall Authentication Proxy.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/14770/info

Cisco IOS Firewall Authentication Proxy is prone to a buffer overflow condition. Successful exploitation of this issue could cause a denial of service or potential execution of arbitrary code.

This issue affects the FTP and Telnet protocols, but not HTTP. 

perl -e 'print "pass "; print "A" x 51; print "@ \n";'