Описание
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
hardy | DNE | |
lucid | released | 0.3.1-1ubuntu1.1 |
natty | ignored | end of life |
oneiric | released | 0.3.1-2ubuntu6.1 |
precise | not-affected | 0.4.7-0ubuntu4 |
quantal | not-affected | |
upstream | needs-triage |
Показывать по
10 Critical
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c ...
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
10 Critical
CVSS2