CVE-2020-26154 — Classic Buffer Overflow in Project Libproxy
Severity
9.8CRITICALNVD
EPSS
0.7%
top 27.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 30
Latest updateMay 24
Description
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 32, 33
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled as demonstrated by a large PAC file that is delivered without a Content-length header.↗2020-09-08
Red Hat▶
libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow↗2020-07-16
Debian▶
CVE-2020-26154: libproxy - url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is ena...↗2020
💬Community
2Bugzilla▶
CVE-2020-26154 libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [fedora-all]↗2020-09-29
Bugzilla▶
CVE-2020-26154 libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow↗2020-08-18