CVE-2012-5580
Published: 27 October 2014
Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.
Notes
Author | Note |
---|---|
mdeslaur | only used in "proxy" tool in libproxy-tools package, and caught by FORTIFY_SOURCE. Reproducer from SUSE bug: http_proxy=http://foo%n.suse.de/ proxy http://foo.bar.de |
Priority
Status
Package | Release | Status |
---|---|---|
libproxy Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(0.4.7-0ubuntu4.1)
|
|
quantal |
Not vulnerable
(0.4.7-0ubuntu6)
|
|
raring |
Not vulnerable
(0.4.10-0ubuntu1)
|
|
upstream |
Released
(0.3.1-5.1)
|
|
Patches: upstream: https://code.google.com/p/libproxy/source/detail?r=475 |
||
This vulnerability is mitigated in part by the use of -D_FORTIFY_SOURCE=2 in Ubuntu. |