Vulnerabilites related to dest-unreach - socat
Vulnerability from fkie_nvd
Published
2010-09-14 21:00
Modified
2024-11-21 01:17
Severity ?
Summary
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dest-unreach | socat | 1.5.0.0 | |
dest-unreach | socat | 1.6.0.0 | |
dest-unreach | socat | 1.6.0.1 | |
dest-unreach | socat | 1.7.0.0 | |
dest-unreach | socat | 1.7.0.1 | |
dest-unreach | socat | 1.7.1.0 | |
dest-unreach | socat | 1.7.1.1 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*", "matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*", "matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*", "matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n nestlex en nestlex.c en Socat 1.5.0.0 a 1.7.1.2 y 2.0.0-b1 a 2.0.0-b3, cuando el reenv\u00edo bidireccional de datos est\u00e1 habilitado, permite a atacantes dependientes del contexto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos de l\u00ednea de comandos largos." } ], "id": "CVE-2010-2799", "lastModified": "2024-11-21T01:17:23.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-09-14T21:00:01.703", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443" }, { "source": "secalert@redhat.com", "url": "http://bugs.gentoo.org/show_bug.cgi?id=330785" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2010/dsa-2090" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=330785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2010/dsa-2090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/msmania/poodim/commit/6340d5d2c81e55e61522c4b40a6cdd5c39738cc6" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-06-21 15:55
Modified
2024-11-21 01:34
Severity ?
Summary
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dest-unreach | socat | 1.4.0.0 | |
dest-unreach | socat | 1.4.0.1 | |
dest-unreach | socat | 1.4.0.2 | |
dest-unreach | socat | 1.4.0.3 | |
dest-unreach | socat | 1.4.1.0 | |
dest-unreach | socat | 1.4.2.0 | |
dest-unreach | socat | 1.4.3.1 | |
dest-unreach | socat | 1.5.0.0 | |
dest-unreach | socat | 1.6.0.0 | |
dest-unreach | socat | 1.6.0.1 | |
dest-unreach | socat | 1.7.0.0 | |
dest-unreach | socat | 1.7.0.1 | |
dest-unreach | socat | 1.7.1.0 | |
dest-unreach | socat | 1.7.1.1 | |
dest-unreach | socat | 1.7.1.2 | |
dest-unreach | socat | 1.7.1.3 | |
dest-unreach | socat | 1.7.2.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "484E84E3-C649-4927-800B-BC41B62CDC66", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6155431A-7487-46D9-8F32-185C198CD2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C191EDF-E53C-4E37-8ED4-488B23C844D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "64E2E694-D2BF-4E35-B65E-7DD020B76972", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "13D897B0-BCBF-4670-82C6-AD877C5EC167", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "324DB41F-9A19-4BDB-9187-13EFA0902785", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BDC15BD-7398-4108-A598-662CA955F644", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "17BEC895-BD41-42D5-B82A-72F81D30E776", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5F35F95-B83A-4ED0-B40C-8E1C513F37A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEF36D5D-1FD1-4484-8481-19E1E9F5571A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*", "matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*", "matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*", "matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*", "matchCriteriaId": "07DE8F2A-AE2C-4EE9-80BE-2B77334ACE9D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address." }, { "lang": "es", "value": "Desbordamiento de bufer basado en memoria din\u00e1mica (heap) en la funci\u00f3n xioscan_readline en xio-readline.c en socat v1.4.0.0 a v1.7.2.0 y v2.0.0-b1 a v2.0.0-b4 permite a usuarios locales ejecutar c\u00f3digo de sus elecci\u00f3n a trav\u00e9s de la direcci\u00f3n READLINE." } ], "id": "CVE-2012-0219", "lastModified": "2024-11-21T01:34:36.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-21T15:55:11.207", "references": [ { "source": "security@debian.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html" }, { "source": "security@debian.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49105" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/49746" }, { "source": "security@debian.org", "url": "http://security.gentoo.org/glsa/glsa-201208-01.xml" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html" }, { "source": "security@debian.org", "url": "http://www.lwn.net/Articles/504742/" }, { "source": "security@debian.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "source": "security@debian.org", "url": "http://www.openwall.com/lists/oss-security/2012/05/14/2" }, { "source": "security@debian.org", "url": "http://www.osvdb.org/81969" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/53510" }, { "source": "security@debian.org", "url": "http://www.securitytracker.com/id?1027064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201208-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.lwn.net/Articles/504742/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/14/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/81969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027064" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-08 21:29
Modified
2024-11-21 02:25
Severity ?
Summary
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dest-unreach | socat | * | |
dest-unreach | socat | 2.0.0-b8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*", "matchCriteriaId": "88B415A1-B1B3-4845-A2ED-B0735AC4A5C2", "versionEndIncluding": "1.7.2.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0-b8:*:*:*:*:*:*:*", "matchCriteriaId": "F2861C5A-DC2B-4A26-B691-9EA78218C503", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash)." }, { "lang": "es", "value": "Las implementaciones del manejador de se\u00f1al en socat, versiones anteriores a la 1.7.3.0 y a la 2.0.0-b8 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo o ca\u00edda de proceso)." } ], "id": "CVE-2015-1379", "lastModified": "2024-11-21T02:25:18.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-08T21:29:00.190", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dest-unreach.org/socat/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/27/19" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/06/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72321" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.dest-unreach.org/socat/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/27/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/06/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-05-08 14:29
Modified
2024-11-21 01:53
Severity ?
Summary
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dest-unreach | socat | 1.2.0.0 | |
dest-unreach | socat | 1.3.0.0 | |
dest-unreach | socat | 1.3.0.1 | |
dest-unreach | socat | 1.3.1.0 | |
dest-unreach | socat | 1.3.2.0 | |
dest-unreach | socat | 1.3.2.1 | |
dest-unreach | socat | 1.3.2.2 | |
dest-unreach | socat | 1.4.0.0 | |
dest-unreach | socat | 1.4.0.1 | |
dest-unreach | socat | 1.4.0.2 | |
dest-unreach | socat | 1.4.0.3 | |
dest-unreach | socat | 1.4.1.0 | |
dest-unreach | socat | 1.4.2.0 | |
dest-unreach | socat | 1.4.3.0 | |
dest-unreach | socat | 1.4.3.1 | |
dest-unreach | socat | 1.5.0.0 | |
dest-unreach | socat | 1.6.0.0 | |
dest-unreach | socat | 1.6.0.1 | |
dest-unreach | socat | 1.7.0.0 | |
dest-unreach | socat | 1.7.0.1 | |
dest-unreach | socat | 1.7.1.0 | |
dest-unreach | socat | 1.7.1.1 | |
dest-unreach | socat | 1.7.1.2 | |
dest-unreach | socat | 1.7.1.3 | |
dest-unreach | socat | 1.7.2.0 | |
dest-unreach | socat | 1.7.2.1 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1CF4F3C1-1CE9-44BC-B510-1802E57B6680", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6618A30F-2FC9-48D0-8C70-F12748F83D2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF45DB7D-2751-4709-9240-25A8335A82B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CDC9F84-2E18-4D1C-9E74-718CD174C543", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6ECD914-987C-4B8D-A985-C6E68749CA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBF894DA-EC5E-43E0-B88F-764AA0A6C238", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C77701F-CC50-44B9-8C98-26E75AF562B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "484E84E3-C649-4927-800B-BC41B62CDC66", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6155431A-7487-46D9-8F32-185C198CD2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C191EDF-E53C-4E37-8ED4-488B23C844D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "64E2E694-D2BF-4E35-B65E-7DD020B76972", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "13D897B0-BCBF-4670-82C6-AD877C5EC167", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "324DB41F-9A19-4BDB-9187-13EFA0902785", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "57E632D6-3B7A-49C0-B320-2AB4094ECF98", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BDC15BD-7398-4108-A598-662CA955F644", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "17BEC895-BD41-42D5-B82A-72F81D30E776", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5F35F95-B83A-4ED0-B40C-8E1C513F37A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEF36D5D-1FD1-4484-8481-19E1E9F5571A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A38BE461-2B65-495D-8D5E-BEAE29AC1040", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*", "matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*", "matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*", "matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*", "matchCriteriaId": "07DE8F2A-AE2C-4EE9-80BE-2B77334ACE9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*", "matchCriteriaId": "DDEB3CA6-8B73-4D4D-BF77-D0B9974620F7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions." }, { "lang": "es", "value": "socat 1.2.0.0 anterior a 1.7.2.2 y 2.0.0-b1 anterior a 2.0.0-b6, cuando se utiliza para una direcci\u00f3n tipo escucha y la opci\u00f3n de bifurcaci\u00f3n est\u00e1 habilitada, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de descriptor de archivos) a trav\u00e9s de solicitudes m\u00faltiples que est\u00e1n denegadas bas\u00e1ndose en las restricciones (1) sourceport, (2) lowport, (3) range o (4) tcpwrap." } ], "id": "CVE-2013-3571", "lastModified": "2024-11-21T01:53:54.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-08T14:29:08.957", "references": [ { "source": "cve@mitre.org", "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2013/05/26/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/05/26/1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-01-30 22:59
Modified
2024-11-21 02:48
Severity ?
Summary
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.dest-unreach.org/socat/contrib/socat-secadv7.html | Patch, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/02/01/4 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/02/04/1 | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201612-23 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.dest-unreach.org/socat/contrib/socat-secadv7.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/02/01/4 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/02/04/1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201612-23 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dest-unreach | socat | 1.7.3.0 | |
dest-unreach | socat | 2.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2E98265-AE64-4C62-A138-370C7A30E39A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b8:*:*:*:*:*:*", "matchCriteriaId": "6AFF8CA8-2FD9-48A9-B8BB-B1FE26D48865", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret." }, { "lang": "es", "value": "La implementaci\u00f3n de direcciones OpenSSL en Socat 1.7.3.0 y 2.0.0-b8 no utiliza un n\u00famero primo para el DH, lo que facilita a los atacantes remotos obtener el secreto compartido." } ], "id": "CVE-2016-2217", "lastModified": "2024-11-21T02:48:03.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-01-30T22:59:00.310", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/01/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/04/1" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201612-23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/01/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201612-23" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-320" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-04 21:55
Modified
2024-11-21 02:01
Severity ?
Summary
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
dest-unreach | socat | 2.0.0 | |
fedoraproject | fedora | 19 | |
fedoraproject | fedora | 20 | |
opensuse | opensuse | 13.1 | |
dest-unreach | socat | 1.3.0.0 | |
dest-unreach | socat | 1.3.0.1 | |
dest-unreach | socat | 1.3.1.0 | |
dest-unreach | socat | 1.3.2.0 | |
dest-unreach | socat | 1.3.2.1 | |
dest-unreach | socat | 1.3.2.2 | |
dest-unreach | socat | 1.4.0.0 | |
dest-unreach | socat | 1.4.0.1 | |
dest-unreach | socat | 1.4.0.2 | |
dest-unreach | socat | 1.4.0.3 | |
dest-unreach | socat | 1.4.1.0 | |
dest-unreach | socat | 1.4.2.0 | |
dest-unreach | socat | 1.4.3.0 | |
dest-unreach | socat | 1.4.3.1 | |
dest-unreach | socat | 1.5.0.0 | |
dest-unreach | socat | 1.6.0.0 | |
dest-unreach | socat | 1.6.0.1 | |
dest-unreach | socat | 1.7.0.0 | |
dest-unreach | socat | 1.7.0.1 | |
dest-unreach | socat | 1.7.1.0 | |
dest-unreach | socat | 1.7.1.1 | |
dest-unreach | socat | 1.7.1.2 | |
dest-unreach | socat | 1.7.1.3 | |
dest-unreach | socat | 1.7.2.0 | |
dest-unreach | socat | 1.7.2.1 | |
dest-unreach | socat | 1.7.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*", "matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*", "matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*", "matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*", "matchCriteriaId": "07DE8F2A-AE2C-4EE9-80BE-2B77334ACE9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*", "matchCriteriaId": "DDEB3CA6-8B73-4D4D-BF77-D0B9974620F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b6:*:*:*:*:*:*", "matchCriteriaId": "54BBDF18-0939-41CD-B26A-661CB1F9CF9E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6618A30F-2FC9-48D0-8C70-F12748F83D2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF45DB7D-2751-4709-9240-25A8335A82B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CDC9F84-2E18-4D1C-9E74-718CD174C543", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6ECD914-987C-4B8D-A985-C6E68749CA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBF894DA-EC5E-43E0-B88F-764AA0A6C238", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0C77701F-CC50-44B9-8C98-26E75AF562B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "484E84E3-C649-4927-800B-BC41B62CDC66", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6155431A-7487-46D9-8F32-185C198CD2BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9C191EDF-E53C-4E37-8ED4-488B23C844D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "64E2E694-D2BF-4E35-B65E-7DD020B76972", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "13D897B0-BCBF-4670-82C6-AD877C5EC167", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "324DB41F-9A19-4BDB-9187-13EFA0902785", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "57E632D6-3B7A-49C0-B320-2AB4094ECF98", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BDC15BD-7398-4108-A598-662CA955F644", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "17BEC895-BD41-42D5-B82A-72F81D30E776", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5F35F95-B83A-4ED0-B40C-8E1C513F37A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "FEF36D5D-1FD1-4484-8481-19E1E9F5571A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A38BE461-2B65-495D-8D5E-BEAE29AC1040", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6D4EC384-DA4A-475F-BF36-7092BEB79C2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line." }, { "lang": "es", "value": "Desbordamiento de buffer basado en pila en Socat 1.3.0.0 hasta 1.7.2.2 y 2.0.0-b1 hasta 2.0.0-b6 permite a usuarios locales causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) a trav\u00e9s de un nombre de servidor largo en la direcci\u00f3n PROXY-CONNECT en la l\u00ednea de comandos." } ], "id": "CVE-2014-0019", "lastModified": "2024-11-21T02:01:11.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-04T21:55:05.263", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://osvdb.org/102612" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://seclists.org/oss-sec/2014/q1/159" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.dest-unreach.org/socat" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/102612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://seclists.org/oss-sec/2014/q1/159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.dest-unreach.org/socat" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/65201" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2016-2217
Vulnerability from cvelistv5
Published
2017-01-30 22:00
Modified
2024-08-05 23:24
Severity ?
EPSS score ?
Summary
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201612-23 | vendor-advisory, x_refsource_GENTOO | |
http://www.dest-unreach.org/socat/contrib/socat-secadv7.html | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2016/02/04/1 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2016/02/01/4 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:24:48.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201612-23", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-23" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html" }, { "name": "[oss-security] 20160203 Re: Socat security advisory 7 - Created new 2048bit DH modulus", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/04/1" }, { "name": "[oss-security] 20160201 Socat security advisory 7 - Created new 2048bit DH modulus", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/01/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201612-23", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201612-23" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html" }, { "name": "[oss-security] 20160203 Re: Socat security advisory 7 - Created new 2048bit DH modulus", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/04/1" }, { "name": "[oss-security] 20160201 Socat security advisory 7 - Created new 2048bit DH modulus", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/02/01/4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-2217", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201612-23", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201612-23" }, { "name": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html", "refsource": "CONFIRM", "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html" }, { "name": "[oss-security] 20160203 Re: Socat security advisory 7 - Created new 2048bit DH modulus", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/02/04/1" }, { "name": "[oss-security] 20160201 Socat security advisory 7 - Created new 2048bit DH modulus", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/02/01/4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-2217", "datePublished": "2017-01-30T22:00:00", "dateReserved": "2016-02-03T00:00:00", "dateUpdated": "2024-08-05T23:24:48.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1379
Vulnerability from cvelistv5
Published
2017-06-08 21:00
Modified
2024-08-06 04:40
Severity ?
EPSS score ?
Summary
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
References
▼ | URL | Tags |
---|---|---|
http://www.dest-unreach.org/socat/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/04/06/4 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/72321 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/01/27/19 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1185711 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:40:18.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dest-unreach.org/socat/" }, { "name": "[oss-security] 20150406 Socat security advisory 6 - Possible DoS with fork (update: CVE-Id: CVE-2015-1379; fix for version 2)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/06/4" }, { "name": "72321", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72321" }, { "name": "[oss-security] 20150127 Re: Socat security advisory 6 - Possible DoS with fork", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/27/19" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-08T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dest-unreach.org/socat/" }, { "name": "[oss-security] 20150406 Socat security advisory 6 - Possible DoS with fork (update: CVE-Id: CVE-2015-1379; fix for version 2)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/06/4" }, { "name": "72321", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72321" }, { "name": "[oss-security] 20150127 Re: Socat security advisory 6 - Possible DoS with fork", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/27/19" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.dest-unreach.org/socat/", "refsource": "CONFIRM", "url": "http://www.dest-unreach.org/socat/" }, { "name": "[oss-security] 20150406 Socat security advisory 6 - Possible DoS with fork (update: CVE-Id: CVE-2015-1379; fix for version 2)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/06/4" }, { "name": "72321", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72321" }, { "name": "[oss-security] 20150127 Re: Socat security advisory 6 - Possible DoS with fork", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/27/19" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1379", "datePublished": "2017-06-08T21:00:00", "dateReserved": "2015-01-27T00:00:00", "dateUpdated": "2024-08-06T04:40:18.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2799
Vulnerability from cvelistv5
Published
2010-09-14 20:03
Modified
2024-09-25 22:46
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=620426 | x_refsource_CONFIRM | |
http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch | x_refsource_CONFIRM | |
http://www.dest-unreach.org/socat/contrib/socat-secadv2.html | x_refsource_CONFIRM | |
http://bugs.gentoo.org/show_bug.cgi?id=330785 | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443 | x_refsource_CONFIRM | |
http://www.debian.org/security/2010/dsa-2090 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-25T22:46:51.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://github.com/msmania/poodim/commit/6340d5d2c81e55e61522c4b40a6cdd5c39738cc6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=330785" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443" }, { "name": "DSA-2090", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2090" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-09-14T20:03:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=330785" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443" }, { "name": "DSA-2090", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2090" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2799", "datePublished": "2010-09-14T20:03:00Z", "dateReserved": "2010-07-22T00:00:00Z", "dateUpdated": "2024-09-25T22:46:51.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0219
Vulnerability from cvelistv5
Published
2012-06-21 15:00
Modified
2024-08-06 18:16
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:19.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49746", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49746" }, { "name": "1027064", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027064" }, { "name": "FEDORA-2012-8328", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html" }, { "name": "GLSA-201208-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201208-01.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html" }, { "name": "FEDORA-2012-8274", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html" }, { "name": "openSUSE-SU-2012:0809", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.lwn.net/Articles/504742/" }, { "name": "53510", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53510" }, { "name": "MDVSA-2013:169", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "name": "81969", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/81969" }, { "name": "49105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49105" }, { "name": "[oss-security] 20120514 socat security advisory", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/14/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-08T12:57:00", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "49746", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49746" }, { "name": "1027064", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027064" }, { "name": "FEDORA-2012-8328", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html" }, { "name": "GLSA-201208-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201208-01.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html" }, { "name": "FEDORA-2012-8274", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html" }, { "name": "openSUSE-SU-2012:0809", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.lwn.net/Articles/504742/" }, { "name": "53510", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53510" }, { "name": "MDVSA-2013:169", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "name": "81969", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/81969" }, { "name": "49105", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49105" }, { "name": "[oss-security] 20120514 socat security advisory", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/14/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2012-0219", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49746", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49746" }, { "name": "1027064", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027064" }, { "name": "FEDORA-2012-8328", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html" }, { "name": "GLSA-201208-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201208-01.xml" }, { "name": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html", "refsource": "CONFIRM", "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html" }, { "name": "FEDORA-2012-8274", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html" }, { "name": "openSUSE-SU-2012:0809", "refsource": "SUSE", "url": "http://www.lwn.net/Articles/504742/" }, { "name": "53510", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53510" }, { "name": "MDVSA-2013:169", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "name": "81969", "refsource": "OSVDB", "url": "http://www.osvdb.org/81969" }, { "name": "49105", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49105" }, { "name": "[oss-security] 20120514 socat security advisory", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/14/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2012-0219", "datePublished": "2012-06-21T15:00:00", "dateReserved": "2011-12-14T00:00:00", "dateUpdated": "2024-08-06T18:16:19.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0019
Vulnerability from cvelistv5
Published
2014-02-04 16:00
Modified
2024-08-06 08:58
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html | vendor-advisory, x_refsource_FEDORA | |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:033 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/65201 | vdb-entry, x_refsource_BID | |
http://osvdb.org/102612 | vdb-entry, x_refsource_OSVDB | |
http://seclists.org/oss-sec/2014/q1/159 | mailing-list, x_refsource_MLIST | |
http://www.dest-unreach.org/socat | x_refsource_CONFIRM | |
http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html | vendor-advisory, x_refsource_SUSE | |
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:58:26.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2014-1795", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html" }, { "name": "MDVSA-2014:033", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033" }, { "name": "65201", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65201" }, { "name": "102612", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102612" }, { "name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q1/159" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dest-unreach.org/socat" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt" }, { "name": "openSUSE-SU-2015:0760", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" }, { "name": "FEDORA-2014-1811", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-30T14:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2014-1795", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html" }, { "name": "MDVSA-2014:033", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033" }, { "name": "65201", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65201" }, { "name": "102612", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102612" }, { "name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q1/159" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dest-unreach.org/socat" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt" }, { "name": "openSUSE-SU-2015:0760", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" }, { "name": "FEDORA-2014-1811", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2014-1795", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html" }, { "name": "MDVSA-2014:033", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033" }, { "name": "65201", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65201" }, { "name": "102612", "refsource": "OSVDB", "url": "http://osvdb.org/102612" }, { "name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q1/159" }, { "name": "http://www.dest-unreach.org/socat", "refsource": "CONFIRM", "url": "http://www.dest-unreach.org/socat" }, { "name": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt", "refsource": "MISC", "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt" }, { "name": "openSUSE-SU-2015:0760", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" }, { "name": "FEDORA-2014-1811", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0019", "datePublished": "2014-02-04T16:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T08:58:26.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-54661
Vulnerability from cvelistv5
Published
2024-12-04 00:00
Modified
2025-01-09 16:30
Severity ?
EPSS score ?
Summary
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
dest-unreach | socat |
Version: 1.6.0.0 < 1.8.0.2 Version: 2.0.0-b1 < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "socat", "vendor": "dest-unreach", "versions": [ { "lessThanOrEqual": "1.8.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-54661", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:54:07.899241Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-09T16:30:38.380Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "socat", "vendor": "dest-unreach", "versions": [ { "lessThan": "1.8.0.2", "status": "affected", "version": "1.6.0.0", "versionType": "custom" }, { "lessThanOrEqual": "2.0.0-b9", "status": "affected", "version": "2.0.0-b1", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.8.0.2", "versionStartIncluding": "1.6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.0.0-b9", "versionStartIncluding": "2.0.0-b1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "CWE-61 UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-07T01:00:11.506Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/readline.sh#l29" }, { "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv9.html" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-54661", "datePublished": "2024-12-04T00:00:00", "dateReserved": "2024-12-04T00:00:00", "dateUpdated": "2025-01-09T16:30:38.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3571
Vulnerability from cvelistv5
Published
2014-05-08 14:00
Modified
2024-08-06 16:14
Severity ?
EPSS score ?
Summary
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
References
▼ | URL | Tags |
---|---|---|
http://www.dest-unreach.org/socat/contrib/socat-secadv4.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:169 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.openwall.com/lists/oss-security/2013/05/26/1 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:14:56.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html" }, { "name": "MDVSA-2013:169", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "name": "[oss-security] 20130526 socat security advisory 4 - CVE-2013-3571", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/26/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-26T00:00:00", "descriptions": [ { "lang": "en", "value": "socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-08T12:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html" }, { "name": "MDVSA-2013:169", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "name": "[oss-security] 20130526 socat security advisory 4 - CVE-2013-3571", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/26/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-3571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html", "refsource": "CONFIRM", "url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html" }, { "name": "MDVSA-2013:169", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169" }, { "name": "[oss-security] 20130526 socat security advisory 4 - CVE-2013-3571", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/05/26/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-3571", "datePublished": "2014-05-08T14:00:00", "dateReserved": "2013-05-21T00:00:00", "dateUpdated": "2024-08-06T16:14:56.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }