Описание
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 0.4.7-0ubuntu6 |
| hardy | DNE | |
| lucid | not-affected | |
| natty | not-affected | |
| oneiric | not-affected | 0.3.1-2ubuntu6 |
| precise | released | 0.4.7-0ubuntu4.1 |
| quantal | released | 0.4.7-0ubuntu6 |
| upstream | released | 0.4.9 |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
Stack-based buffer overflow in the url::get_pac function in url.cpp in ...
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
10 Critical
CVSS2