Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5580

Опубликовано: 27 окт. 2014
Источник: debian
EPSS Низкий

Описание

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libproxyfixed0.3.1-4package
libproxyno-dsasqueezepackage

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=791086

  • https://code.google.com/p/libproxy/source/detail?r=475

EPSS

Процентиль: 74%
0.00802
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.

redhat
около 13 лет назад

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.

nvd
больше 11 лет назад

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.

github
больше 3 лет назад

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.

EPSS

Процентиль: 74%
0.00802
Низкий