Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qqf-vxv4-9698

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

EPSS

Процентиль: 80%
0.01422
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 15 лет назад

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

nvd
больше 15 лет назад

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

debian
больше 15 лет назад

Stack-based buffer overflow in the nestlex function in nestlex.c in So ...

EPSS

Процентиль: 80%
0.01422
Низкий

Дефекты

CWE-119