[24372] in bugtraq

home help back first fref pref prev next nref lref last post

RE: UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint fire

daemon@ATHENA.MIT.EDU (Proescholdt, timo)
Thu Feb 21 20:38:30 2002

Message-ID: <410B51F29EA8D3118EE400508B44AE2B3C6FCD@rz-nt-mail.brk-muenchen.de>
From: "Proescholdt, timo" <Timo.Proescholdt@brk-muenchen.de>
To: bugtraq@securityfocus.com
Cc: "'Steve VanDevender'" <stevev@hexadecimal.uoregon.edu>
Date: Thu, 21 Feb 2002 00:55:49 +0100
MIME-Version: 1.0
Content-Type: text/plain;
	charset="windows-1252"


> It's not just Checkpoint Firewall that has a problem with HTTP
CONNECT.>
> From what I can tell default installations of the CacheFlow web proxy
> software, some Squid installations, some Apache installations with
> proxying enabled, and some other web proxy installations I haven't
> identified allow anyone to use the HTTP CONNECT method.  This is being

Finjan-SurfinGate/4.0 ( NT ) is "vulnerable" , Trend Micro Interscan
Viruswall ( 3.51 ) ( NT ) as well. Both do not seem to have a
configuration
switch to change this behaviour. 
Squid 2.3 STABLE 1 seems not to be affected by this issue, as there is
no 
CONNECT Method allowed in default configuration.

greetings 
timo

home help back first fref pref prev next nref lref last post