Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-4505

Опубликовано: 11 нояб. 2012
Источник: ubuntu
Приоритет: medium
CVSS2: 10

Описание

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

released

0.3.1-1ubuntu1.1
natty

ignored

end of life
oneiric

released

0.3.1-2ubuntu6.1
precise

not-affected

0.4.7-0ubuntu4
quantal

not-affected

upstream

needs-triage

Показывать по

10 Critical

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

nvd
почти 13 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

debian
почти 13 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c ...

github
больше 3 лет назад

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

oracle-oval
почти 13 лет назад

ELSA-2012-1461: libproxy security update (MODERATE)

10 Critical

CVSS2