Описание
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-2799
- https://github.com/msmania/poodim/commit/6340d5d2c81e55e61522c4b40a6cdd5c39738cc6
- https://bugzilla.redhat.com/show_bug.cgi?id=620426
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443
- http://bugs.gentoo.org/show_bug.cgi?id=330785
- http://www.debian.org/security/2010/dsa-2090
- http://www.dest-unreach.org/socat/contrib/socat-secadv2.html
- http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch
Связанные уязвимости
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
Stack-based buffer overflow in the nestlex function in nestlex.c in So ...