CVE-2012-4505

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
libproxy_projectlibproxy
0.2.3
libproxy_projectlibproxy
0.3.0
libproxy_projectlibproxy
0.3.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libproxy
bullseye
0.4.17-1
fixed
bookworm
0.4.18-1.2
fixed
sid
0.5.9-1
fixed
trixie
0.5.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libproxy
quantal
not-affected
precise
not-affected
oneiric
Fixed 0.3.1-2ubuntu6.1
released
natty
ignored
lucid
Fixed 0.3.1-1ubuntu1.1
released
hardy
dne