7.5
CVSSv2

CVE-2006-2926

Published: 09/06/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the WWW Proxy Server of Qbik WinGate 6.1.1.1077 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long URL HTTP request.

Vulnerable Product Search on Vulmon Subscribe to Product

qbik wingate 6.1.1.1077

Exploits

## # $Id: qbik_wingate_wwwproxyrb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...
### *** Proof of concept (not for "in the wild" kiddies) *** ### QBik Wingate version 6111077 remote exploit for Win2k SP4 (german) ### by kcope in 2006 ### use IO::Socket; if ($ARGV[0] eq "") { print "param1 = remote host"; exit; } # win32_bind - EXITFUNC=seh LPORT=4444 Size=709 Encoder=PexAlphaNum metasploitcom my $shellcode = "\x ...