Описание
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 0.4.15-1ubuntu0.2 |
| devel | not-affected | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | released | 0.4.15-1ubuntu0.2 |
| esm-infra/focal | released | 0.4.15-10ubuntu1.2 |
| esm-infra/xenial | released | 0.4.11-5ubuntu1.2 |
| focal | released | 0.4.15-10ubuntu1.2 |
| groovy | released | 0.4.15-13ubuntu1.1 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
Показывать по
EPSS
6.8 Medium
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when ...
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
EPSS
6.8 Medium
CVSS2
9.8 Critical
CVSS3