[24372] in bugtraq
RE: UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint fire
daemon@ATHENA.MIT.EDU (Proescholdt, timo)
Thu Feb 21 20:38:30 2002
Message-ID: <410B51F29EA8D3118EE400508B44AE2B3C6FCD@rz-nt-mail.brk-muenchen.de>
From: "Proescholdt, timo" <Timo.Proescholdt@brk-muenchen.de>
To: bugtraq@securityfocus.com
Cc: "'Steve VanDevender'" <stevev@hexadecimal.uoregon.edu>
Date: Thu, 21 Feb 2002 00:55:49 +0100
MIME-Version: 1.0
Content-Type: text/plain;
charset="windows-1252"
> It's not just Checkpoint Firewall that has a problem with HTTP
CONNECT.>
> From what I can tell default installations of the CacheFlow web proxy
> software, some Squid installations, some Apache installations with
> proxying enabled, and some other web proxy installations I haven't
> identified allow anyone to use the HTTP CONNECT method. This is being
Finjan-SurfinGate/4.0 ( NT ) is "vulnerable" , Trend Micro Interscan
Viruswall ( 3.51 ) ( NT ) as well. Both do not seem to have a
configuration
switch to change this behaviour.
Squid 2.3 STABLE 1 seems not to be affected by this issue, as there is
no
CONNECT Method allowed in default configuration.
greetings
timo