Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2c9m-9m4q-pf59

Опубликовано: 04 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

EPSS

Процентиль: 39%
0.00172
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

nvd
больше 13 лет назад

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

debian
больше 13 лет назад

Heap-based buffer overflow in the xioscan_readline function in xio-rea ...

EPSS

Процентиль: 39%
0.00172
Низкий

Дефекты

CWE-119