Описание
Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.
Ссылки
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatch
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:socat:socat:1.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:socat:socat:1.4.0.2:*:*:*:*:*:*:*
EPSS
Процентиль: 84%
0.02313
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
больше 20 лет назад
Format string vulnerability in the _msg function in error.c in socat 1 ...
github
больше 3 лет назад
Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.
EPSS
Процентиль: 84%
0.02313
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other