CVE-2012-4504

Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
libproxy_projectlibproxy
0.4.0
libproxy_projectlibproxy
0.4.1
libproxy_projectlibproxy
0.4.2
libproxy_projectlibproxy
0.4.3
libproxy_projectlibproxy
0.4.5
libproxy_projectlibproxy
0.4.6
libproxy_projectlibproxy
0.4.7
libproxy_projectlibproxy
0.4.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libproxy
bullseye
0.4.17-1
fixed
bookworm
0.4.18-1.2
fixed
sid
0.5.9-1
fixed
trixie
0.5.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libproxy
quantal
Fixed 0.4.7-0ubuntu6
released
precise
Fixed 0.4.7-0ubuntu4.1
released
oneiric
not-affected
natty
not-affected
lucid
not-affected
hardy
dne