{ "schema_version": "1.4.0", "id": "GHSA-c5fx-qjrf-p783", "modified": "2025-04-11T04:04:41Z", "published": "2022-05-14T03:07:56Z", "aliases": [ "CVE-2012-4504" ], "details": "Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4504" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864417" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79249" }, { "type": "WEB", "url": "https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E" }, { "type": "WEB", "url": "https://groups.google.com/forum/?fromgroups=#%21topic/libproxy/VxZ8No7mT0E" }, { "type": "WEB", "url": "http://code.google.com/p/libproxy/source/detail?r=853" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2012-10/msg00065.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/51048" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/10/12/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/10/12/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/10/16/3" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/55909" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1629-1" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-11-11T13:00:00Z" } }