Описание
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | not-affected | 1.7.1.3-1 |
| hardy | ignored | end of life |
| jaunty | released | 1.6.0.1-1+lenny1build0.9.04.1 |
| karmic | ignored | end of life |
| lucid | ignored | end of life |
| maverick | not-affected | 1.7.1.3-1 |
| natty | not-affected | 1.7.1.3-1 |
| oneiric | not-affected | 1.7.1.3-1 |
| precise | not-affected | 1.7.1.3-1 |
Показывать по
Ссылки на источники
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
Stack-based buffer overflow in the nestlex function in nestlex.c in So ...
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
EPSS
6.8 Medium
CVSS2