9.8
CVSSv3

CVE-2020-26154

Published: 30/09/2020 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

url.cpp in libproxy up to and including 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libproxy project libproxy

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 9.0

debian debian linux 10.0

opensuse leap 15.1

opensuse leap 15.2

Vendor Advisories

Debian Bug report logs - #968366 libproxy: CVE-2020-26154: buffer overflow when PAC is enabled Package: src:libproxy; Maintainer for src:libproxy is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Reported by: Simon McVittie <smcv@debianorg> Date: Thu, 13 Aug 2020 15:39:02 UTC Severity: gra ...
Two vulnerabilities were discovered in libproxy, an automatic proxy configuration management library, which could result in denial of service, or possibly, execution of arbitrary code For the stable distribution (buster), these problems have been fixed in version 0415-5+deb10u1 We recommend that you upgrade your libproxy packages For the detai ...