{"id":"CVE-2012-5580","details":"Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment variable or a PAC file.","modified":"2026-04-10T03:44:19.898460Z","published":"2014-10-27T22:55:09Z","references":[{"type":"EVIDENCE","url":"https://bugzilla.novell.com/show_bug.cgi?id=791086"},{"type":"EVIDENCE","url":"https://bugzilla.redhat.com/show_bug.cgi?id=883100"},{"type":"WEB","url":"http://www.securityfocus.com/bid/56712"},{"type":"WEB","url":"https://code.google.com/p/libproxy/source/detail?r=475"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80340"}],"schema_version":"1.7.5"}