CVE-2012-4505

EUVD-2012-4434
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Affected Products (NVD)
VendorProductVersion
libproxy_projectlibproxy
0.2.3
libproxy_projectlibproxy
0.3.0
libproxy_projectlibproxy
0.3.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libproxy
bookworm
0.4.18-1.2
fixed
bullseye
0.4.17-1
fixed
sid
0.5.9-1
fixed
trixie
0.5.9-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libproxy
hardy
dne
lucid
Fixed 0.3.1-1ubuntu1.1
released
natty
ignored
oneiric
Fixed 0.3.1-2ubuntu6.1
released
precise
not-affected
quantal
not-affected