10
CVSSv2

CVE-2012-4504

Published: 11/11/2012 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x prior to 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.

Vulnerable Product Search on Vulmon Subscribe to Product

libproxy project libproxy 0.4.8

libproxy project libproxy 0.4.2

libproxy project libproxy 0.4.0

libproxy project libproxy 0.4.5

libproxy project libproxy 0.4.7

libproxy project libproxy 0.4.3

libproxy project libproxy 0.4.1

libproxy project libproxy 0.4.6

Vendor Advisories

Debian Bug report logs - #690376 libproxy: PAC handling insufficient content length check leading to buffer overflow Package: libproxy; Maintainer for libproxy is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: "Thijs Kinkhorst" <thijs@debianorg> Date: Sat, 13 Oct 2012 13:21:02 ...
libproxy could be made to crash or run programs if it received specially crafted network traffic ...