Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:0343-1

Опубликовано: 05 фев. 2016
Источник: suse-cvrf

Описание

Security update for socat

This update for socat fixes the following issues:

  • CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
  • CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
  • Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)

Список пакетов

SUSE Linux Enterprise Desktop 11 SP4
socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server 11 SP4
socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4
socat-1.7.0.0-1.18.2

Описание

socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4:socat-1.7.0.0-1.18.2

Ссылки

Описание

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4:socat-1.7.0.0-1.18.2

Ссылки