|Category:||Huawei EulerOS Local Security Checks|
|Title:||Huawei EulerOS: Security Advisory for libproxy (EulerOS-SA-2020-2360)|
|Summary:||The remote host is missing an update for the Huawei EulerOS; 'libproxy' package(s) announced via the EulerOS-SA-2020-2360 advisory.|
The remote host is missing an update for the Huawei EulerOS
'libproxy' package(s) announced via the EulerOS-SA-2020-2360 advisory.
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.(CVE-2020-26154)
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.(CVE-2020-25219)
'libproxy' package(s) on Huawei EulerOS V2.0SP2.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2020-25219|
Common Vulnerability Exposure (CVE) ID: CVE-2020-26154
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.