CVE-2012-4504

EUVD-2012-4433
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
libproxy_projectlibproxy
0.4.0
libproxy_projectlibproxy
0.4.1
libproxy_projectlibproxy
0.4.2
libproxy_projectlibproxy
0.4.3
libproxy_projectlibproxy
0.4.5
libproxy_projectlibproxy
0.4.6
libproxy_projectlibproxy
0.4.7
libproxy_projectlibproxy
0.4.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libproxy
bookworm
0.4.18-1.2
fixed
bullseye
0.4.17-1
fixed
sid
0.5.9-1
fixed
trixie
0.5.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libproxy
hardy
dne
lucid
not-affected
natty
not-affected
oneiric
not-affected
precise
Fixed 0.4.7-0ubuntu4.1
released
quantal
Fixed 0.4.7-0ubuntu6
released