Vulnerability CVE-2012-5580


Published: 2014-10-27   Modified: 2014-10-28

Description:
Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Libproxy project -> Libproxy 

 References:
https://code.google.com/p/libproxy/source/detail?r=475
https://bugzilla.redhat.com/show_bug.cgi?id=883100
https://bugzilla.novell.com/show_bug.cgi?id=791086
http://xforce.iss.net/xforce/xfdb/80340
http://www.securityfocus.com/bid/56712

Copyright 2024, cxsecurity.com

 

Back to Top