Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0019

Опубликовано: 04 фев. 2014
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
socatfixed1.7.2.3-1package
socatno-dsasqueezepackage
socatno-dsawheezypackage

EPSS

Процентиль: 25%
0.00086
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

redhat
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

nvd
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

github
больше 3 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

suse-cvrf
около 10 лет назад

Security update for socat

EPSS

Процентиль: 25%
0.00086
Низкий