First published: Thu Aug 13 2020(Updated: )
libproxy is vulnerable to a buffer overflow, caused by improper bounds checking. By persuading a victim to open a specially crafted PAC file, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libproxy | 0.4.15-5+deb10u1 0.4.17-1 0.4.18-1.2 | |
IBM QRadar Security Information and Event Manager | <=7.5 - 7.5.0 UP9 IF03 | |
IBM Security QRadar Incident Forensics | <=7.5 - 7.5.0 UP9 IF03 | |
libproxy | <=0.4.15 | |
Fedora | =32 | |
Fedora | =33 | |
Debian | =9.0 | |
Debian | =10.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26154 has a medium severity rating due to the buffer overflow vulnerability that could allow remote code execution.
To fix CVE-2020-26154, update libproxy to version 0.4.15-5+deb10u1 or any later version provided by your Linux distribution.
CVE-2020-26154 affects systems using libproxy versions prior to 0.4.15, including Debian, Fedora, and openSUSE.
Yes, CVE-2020-26154 can lead to remote code execution if a victim opens a specially crafted PAC file.
CVE-2020-26154 results from improper bounds checking in the url.cpp file of libproxy, allowing exploitation through manipulated input.