Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0219

Опубликовано: 21 июн. 2012
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
socatfixed1.7.1.3-1.3package
socatno-dsasqueezepackage

Примечания

  • http://www.dest-unreach.org/socat/contrib/socat-secadv3.html

EPSS

Процентиль: 39%
0.00172
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

nvd
больше 13 лет назад

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

github
почти 4 года назад

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

EPSS

Процентиль: 39%
0.00172
Низкий