Public Date:
864417: CVE-2012-4504 libproxy: long proxy.pac file handling buffer overflow

The MITRE CVE dictionary describes this issue as:

Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.

Find out more about CVE-2012-4504 from the MITRE CVE dictionary dictionary and NIST NVD.


Not vulnerable. This issue did not affect the version of libproxy as shipped with Red Hat Enterprise Linux 6.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 6.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 libproxy Not affected


This issue was discovered by Tomas Mraz of Red Hat.