Unrated severityNVD Advisory· Published Nov 11, 2012· Updated Apr 29, 2026
CVE-2012-4505
CVE-2012-4505
Description
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
Affected products
3cpe:2.3:a:libproxy_project:libproxy:0.2.3:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:libproxy_project:libproxy:0.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:libproxy_project:libproxy:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:libproxy_project:libproxy:0.3.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- secunia.com/advisories/51048nvdVendor Advisory
- secunia.com/advisories/51180nvdVendor Advisory
- lists.opensuse.org/opensuse-updates/2012-10/msg00065.htmlnvd
- rhn.redhat.com/errata/RHSA-2012-1461.htmlnvd
- secunia.com/advisories/51308nvd
- www.debian.org/security/2012/dsa-2571nvd
- www.openwall.com/lists/oss-security/2012/10/12/1nvd
- www.openwall.com/lists/oss-security/2012/10/12/5nvd
- www.openwall.com/lists/oss-security/2012/10/16/3nvd
- www.securityfocus.com/bid/55910nvd
- www.ubuntu.com/usn/USN-1629-1nvd
- bugzilla.redhat.com/show_bug.cginvd
- groups.google.com/forum/nvd
News mentions
0No linked articles in our index yet.