Skip to navigation

CVE Database

CVE-2012-4504

Impact: Moderate
Public: 2012-10-10
Bugzilla: 864417: CVE-2012-4504 libproxy: long proxy.pac file handling buffer overflow

Details

The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.

Find out more about CVE-2012-4504 from the MITRE CVE dictionary and NIST NVD.

Statement

Not vulnerable. This issue did not affect the version of libproxy as shipped with Red Hat Enterprise Linux 6.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score: 6.8
Base Metrics: AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date

External References

Acknowledgements

This issue was discovered by Tomas Mraz of Red Hat.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.