Описание
Security update for socat
This update for socat fixes the following issues:
- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
Список пакетов
SUSE Linux Enterprise Desktop 11 SP4
socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server 11 SP4
socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4
socat-1.7.0.0-1.18.2
Ссылки
- Link for SUSE-SU-2016:0343-1
- E-Mail link for SUSE-SU-2016:0343-1
- SUSE Security Ratings
- SUSE Bug 821985
- SUSE Bug 860991
- SUSE Bug 964844
- SUSE CVE CVE-2013-3571 page
- SUSE CVE CVE-2014-0019 page
Описание
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4:socat-1.7.0.0-1.18.2
Ссылки
- CVE-2013-3571
- SUSE Bug 821985
Описание
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server 11 SP4:socat-1.7.0.0-1.18.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4:socat-1.7.0.0-1.18.2
Ссылки
- CVE-2014-0019
- SUSE Bug 860991
- SUSE Bug 927161