CVE-2012-5580

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libproxy_project:libproxy:0.3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/56712 - () http://www.securityfocus.com/bid/56712 -
References () https://bugzilla.novell.com/show_bug.cgi?id=791086 - Exploit () https://bugzilla.novell.com/show_bug.cgi?id=791086 - Exploit
References () https://bugzilla.redhat.com/show_bug.cgi?id=883100 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=883100 - Exploit
References () https://code.google.com/p/libproxy/source/detail?r=475 - () https://code.google.com/p/libproxy/source/detail?r=475 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/80340 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80340 -

Information

Published : 2014-10-27 22:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5580

Mitre link : CVE-2012-5580

CVE.ORG link : CVE-2012-5580


JSON object : View

Products Affected

libproxy_project

  • libproxy
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')