FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2012-4504

This CVE name corresponds to:

Entered Topic
2016-01-17 libproxy -- stack-based buffer overflow

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2012-4504
Phase Assigned(20120821)

Description

Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.

References

Source Reference
MLIST [oss-security] 20121012 Re: libproxy PAC downloading buffer overflows
MLIST [oss-security] 20121012 libproxy PAC downloading buffer overflows
MLIST [oss-security] 20121016 Re: libproxy PAC downloading buffer overflows
MISC http://code.google.com/p/libproxy/source/detail?r=853
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=864417
CONFIRM https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E
SUSE openSUSE-SU-2012:1375
UBUNTU USN-1629-1
BID 55909
SECUNIA 51048
XF libproxy-urlgetpac-bo(79249)