[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2571-1 libproxy -- buffer overflow

ID: oval:org.secpod.oval:def:600913Date: (C)2012-11-06   (M)2022-10-10
Class: PATCHFamily: unix




The Red Hat Security Response Team discovered that libproxy, a library for automatic proxy configuration management, applied insufficient validation to the Content-Length header sent by a server providing a proxy.pac file. Such remote server could trigger an integer overflow and consequently overflow an in-memory buffer.

Platform:
Debian 6.0
Product:
libproxy-dev
libproxy-tools
libproxy0
python-libproxy-dev
Reference:
DSA-2571-1
CVE-2012-4505
CVE    1
CVE-2012-4505
CPE    5
cpe:/a:libproxy_project:python-libproxy-dev
cpe:/a:libproxy_project:libproxy-dev
cpe:/a:libproxy_project:libproxy-tools
cpe:/a:libproxy_project:libproxy0
...

© SecPod Technologies