Submitted by Vincent (CVE) Danen on Fri, 09/18/2015 - 01:33
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
Not vulnerable. This issue did not affect the version of libproxy as shipped with Red Hat Enterprise Linux 6.
CVE-2012-4504 libproxy: long proxy.pac file handling buffer overflow
This issue was discovered by Tomas Mraz of Red Hat.
Affected Packages State
|Red Hat Enterprise Linux 6||libproxy||Not affected|