CVE-2012-5580

Published: 27 October 2014

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.

Priority

Low

Status

Package Release Status
libproxy
Launchpad, Ubuntu, Debian
Upstream
Released (0.3.1-5.1)
Patches:
Upstream: https://code.google.com/p/libproxy/source/detail?r=475
This vulnerability is mitigated in part by the use of -D_FORTIFY_SOURCE=2 in Ubuntu.

Notes

AuthorNote
mdeslaur
only used in "proxy" tool in libproxy-tools package, and
caught by FORTIFY_SOURCE. Reproducer from SUSE bug:
http_proxy=http://foo%n.suse.de/ proxy http://foo.bar.de

References

Bugs