Libproxy Project Libproxy vulnerabilities

5 known vulnerabilities affecting libproxy_project/libproxy.

Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH2

Vulnerabilities

Page 1 of 1
CVE-2020-26154CRITICALCVSS 9.8≤ 0.4.152020-09-30
CVE-2020-26154 [CRITICAL] CWE-120 CVE-2020-26154: url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrate url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
nvdosv
CVE-2020-25219HIGHCVSS 7.5≥ 0.4.0, ≤ 0.4.152020-09-09
CVE-2020-25219 [HIGH] CWE-674 CVE-2020-25219: url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger unc url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
nvdosv
CVE-2012-5580HIGHCVSS 7.5v0.3.12014-10-27
CVE-2012-5580 [HIGH] CWE-94 CVE-2012-5580: Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might all Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.
nvdosv
CVE-2012-4504CRITICALCVSS 10.0v0.4.0v0.4.1+6 more2012-11-11
CVE-2012-4504 [CRITICAL] CWE-119 CVE-2012-4504: Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 a Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
nvd
CVE-2012-4505CRITICALCVSS 10.0v0.2.3v0.3.0+1 more2012-11-11
CVE-2012-4505 [CRITICAL] CVE-2012-4505: Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x al Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.
nvdosv