Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8g7q-m58p-3p6w

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

EPSS

Процентиль: 88%
0.04366
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 13 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

redhat
почти 13 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

nvd
почти 13 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

debian
почти 13 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c ...

oracle-oval
почти 13 лет назад

ELSA-2012-1461: libproxy security update (MODERATE)

EPSS

Процентиль: 88%
0.04366
Низкий

Дефекты

CWE-119