Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-3571

Опубликовано: 08 мая 2014
Источник: debian
EPSS Низкий

Описание

socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
socatfixed1.7.1.3-1.5package
socatno-dsasqueezepackage
socatno-dsawheezypackage

Примечания

  • http://www.dest-unreach.org/socat/contrib/socat-secadv4.html

EPSS

Процентиль: 74%
0.0082
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.

nvd
больше 11 лет назад

socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.

github
больше 3 лет назад

socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.

suse-cvrf
около 10 лет назад

Security update for socat

EPSS

Процентиль: 74%
0.0082
Низкий