Bug 864612 (CVE-2012-4505)
Summary: | CVE-2012-4505 libproxy: PAC handling insufficient content length check leading to buffer overflow | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | danw, fweimer, jlieskov, psklenar, security-response-team | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | libproxy 0.4 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2012-11-15 07:52:44 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 872636, 872637, 874492 | ||||||
Bug Blocks: | 864423 | ||||||
Attachments: |
|
Description
Tomas Hoger
2012-10-09 18:21:42 UTC
(In reply to comment #0) > It does not affect 0.4.x versions, where fixed size buffer is used. 0.4.x versions were affected by a different overflow in the PAC loading code, see bug 864417. This problem was discovered while investigating the 0.4.x issue. Acknowledgment: This issue was discovered by the Red Hat Security Response Team. Created attachment 625842 [details]
libproxy 0.3 patch
Proposed patch for libproxy 0.3.x. It introduces the same PAC_MAX_SIZE as used in 0.4 (102400) and uses it as the maximum acceptable proxy.pac file size, avoiding integer wraparound on +1. It also adds recv return value checks.
Semi-public now via upstream announcement of the 0.4.9 version, which fixes similar CVE-2012-4504 which affected 0.4.x versions: https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E Making bug public. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1461 https://rhn.redhat.com/errata/RHSA-2012-1461.html |