From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-201404-02.xml | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 51 insertions(+) create mode 100644 glsa-201404-02.xml (limited to 'glsa-201404-02.xml') diff --git a/glsa-201404-02.xml b/glsa-201404-02.xml new file mode 100644 index 000000000000..b03e0306de09 --- /dev/null +++ b/glsa-201404-02.xml @@ -0,0 +1,51 @@ + + + + + + libproxy: User-assisted execution of arbitrary code + A buffer overflow in libproxy might allow remote attackers to + execute arbitrary code. + + libproxy + April 07, 2014 + April 07, 2014: 1 + 438146 + remote + + + 0.4.10 + 0.4.10 + + + +

libproxy is a library for automatic proxy configuration management.

+
+ +

A boundary error when processing the proxy.pac file could cause a + stack-based buffer overflow. +

+
+ +

A man-in-the-middle attacker could provide a specially crafted proxy.pac + file on a remote server, possibly resulting in execution of arbitrary + code with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libproxy users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libproxy-0.4.10" + +
+ + CVE-2012-4504 + + ackle + ackle +
-- cgit v1.2.3-65-gdbad