url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
References
Information
Published : 2020-09-30 18:15
Updated : 2020-11-29 04:15
NVD link : CVE-2020-26154
Mitre link : CVE-2020-26154
JSON object : View
Products Affected
fedoraproject
- fedora
libproxy_project
- libproxy
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
