Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-0019

Опубликовано: 04 фев. 2014
Источник: nvd
CVSS2: 1.9
EPSS Низкий

Описание

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:2.0.0:b6:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
Конфигурация 3
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dest-unreach:socat:1.7.2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 25%
0.00086
Низкий

1.9 Low

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

redhat
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

debian
около 12 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0 ...

github
больше 3 лет назад

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

suse-cvrf
около 10 лет назад

Security update for socat

EPSS

Процентиль: 25%
0.00086
Низкий

1.9 Low

CVSS2

Дефекты

CWE-119