Blue Coat ProxySG Recursive HTTP Pipeline Pre-Fetch Remote DoS

high Nessus Plugin ID 70302

Synopsis

The remote device is potentially affected by a denial of service vulnerability.

Description

According to its self-reported version number, the Security Gateway OS (SGOS) version installed on the remote Blue Coat ProxySG device is potentially affected by a denial of service vulnerability caused by a large amount of HTTP RW pipeline pre-fetch requests.

Note that only devices with forward or reverse mode for HTTP traffic enabled are affected.

Solution

Upgrade to SGOS version 5.4.12.9 / 5.5.11.5 / 6.2.14.1 / 6.3.6.2 / 6.4.5.1 / 6.5.2.0 or later. Alternatively, apply the workaround referenced in the vendor advisory.

See Also

https://bto.bluecoat.com/security-advisory/sa75

Plugin Details

Severity: High

ID: 70302

File Name: bluecoat_proxy_sg_6_5_2.nasl

Version: 1.3

Type: local

Family: Firewalls

Published: 10/4/2013

Updated: 6/27/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/h:bluecoat:proxysg, cpe:/o:bluecoat:proxysgos, cpe:/o:bluecoat:sgos

Required KB Items: Settings/ParanoidReport, Host/BlueCoat/ProxySG/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/23/2013

Vulnerability Publication Date: 9/9/2013

Reference Information

CVE: CVE-2013-5959

BID: 62647