First published: Mon Aug 02 2010(Updated: )
Socat upstream, released an advisory: [1] <a href="http://www.dest-unreach.org/socat/contrib/socat-secadv2.html">http://www.dest-unreach.org/socat/contrib/socat-secadv2.html</a> describing a stack overflow flaw, present in Socat bidirectional data relay, when processing command line arguments (address specifications, host names, file names), longer than 512 bytes. An attacker, able to inject data into sockat's command line (potentially remotely via CGI script invocation), could use this flaw to execute arbitrary code with the privileges of the socat process. References: [2] <a href="http://bugs.gentoo.org/show_bug.cgi?id=330785">http://bugs.gentoo.org/show_bug.cgi?id=330785</a> Upstream patch against v1.7.2: [3] <a href="http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch">http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch</a> Credit: Issue discovered and reported by Felix Gröbert of Google Security Team CVE Request: [4] <a href="http://www.openwall.com/lists/oss-security/2010/08/02/3">http://www.openwall.com/lists/oss-security/2010/08/02/3</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dest-unreach Socat | =1.7.1.1 | |
Dest-unreach Socat | =1.7.0.0 | |
Dest-unreach Socat | =1.5.0.0 | |
Dest-unreach Socat | =2.0.0-b3 | |
Dest-unreach Socat | =1.6.0.0 | |
Dest-unreach Socat | =1.7.1.0 | |
Dest-unreach Socat | =2.0.0-b2 | |
Dest-unreach Socat | =1.6.0.1 | |
Dest-unreach Socat | =2.0.0-b1 | |
Dest-unreach Socat | =1.7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.