CacheFlow Inc. Information for VU#150227

HTTP proxy default configurations allow arbitrary TCP connections

Status

Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

In a message posted to BugTraq (BID 4143), Steve VanDevender reports that this vulnerability has been exploited in CacheFlow products to relay spam. In this message to the Incidents mailing list, Tim Kennedy provides a more secure CacheFlow configuration.

If you have feedback, comments, or additional information about this vulnerability, please send us email.