SuSE 11.2 Security Update : libproxy (SAT Patch Number 7092)

critical Nessus Plugin ID 64191

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This update for libproxy fixes a heap-based buffer overflow that could have allowed remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request. (CVE-2012-4505)

Additionally, it fixes parsing of the $no_proxy environment variable when it contains more than one URL separated by white-spaces.

Solution

Apply SAT patch number 7092.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=761626

https://bugzilla.novell.com/show_bug.cgi?id=784523

http://support.novell.com/security/cve/CVE-2012-4505.html

Plugin Details

Severity: Critical

ID: 64191

File Name: suse_11_libproxy-121123.nasl

Version: 1.4

Type: local

Agent: unix

Published: 1/25/2013

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:libproxy0-32bit, p-cpe:/a:novell:suse_linux:11:libproxy0-networkmanager, p-cpe:/a:novell:suse_linux:11:libproxy0-config-gnome-32bit, p-cpe:/a:novell:suse_linux:11:libproxy0, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:libproxy0-networkmanager-32bit, p-cpe:/a:novell:suse_linux:11:libproxy0-config-kde4, p-cpe:/a:novell:suse_linux:11:libproxy0-config-gnome

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 11/23/2012

Reference Information

CVE: CVE-2012-4505