Bug 864612 (CVE-2012-4505)
| Summary: | CVE-2012-4505 libproxy: PAC handling insufficient content length check leading to buffer overflow | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED ERRATA | QA Contact: | |||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | unspecified | CC: | danw, fweimer, jlieskov, psklenar, security-response-team | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | libproxy 0.4 | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2012-11-15 07:52:44 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 872636, 872637, 874492 | ||||||
| Bug Blocks: | 864423 | ||||||
| Attachments: |
|
||||||
|
Description
Tomas Hoger
2012-10-09 18:21:42 UTC
(In reply to comment #0) > It does not affect 0.4.x versions, where fixed size buffer is used. 0.4.x versions were affected by a different overflow in the PAC loading code, see bug 864417. This problem was discovered while investigating the 0.4.x issue. Acknowledgment: This issue was discovered by the Red Hat Security Response Team. Created attachment 625842 [details]
libproxy 0.3 patch
Proposed patch for libproxy 0.3.x. It introduces the same PAC_MAX_SIZE as used in 0.4 (102400) and uses it as the maximum acceptable proxy.pac file size, avoiding integer wraparound on +1. It also adds recv return value checks.
Semi-public now via upstream announcement of the 0.4.9 version, which fixes similar CVE-2012-4504 which affected 0.4.x versions: https://groups.google.com/forum/?fromgroups=#!topic/libproxy/VxZ8No7mT0E Making bug public. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1461 https://rhn.redhat.com/errata/RHSA-2012-1461.html |