Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3256-v4vm-qpwg

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

EPSS

Процентиль: 25%
0.00086
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

redhat
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

nvd
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

debian
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0 ...

suse-cvrf
около 10 лет назад

Security update for socat

EPSS

Процентиль: 25%
0.00086
Низкий

Дефекты

CWE-119