Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-2799

Опубликовано: 14 сент. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1.7.1.3-1
hardy

ignored

end of life
jaunty

released

1.6.0.1-1+lenny1build0.9.04.1
karmic

ignored

end of life
lucid

ignored

end of life
maverick

not-affected

1.7.1.3-1
natty

not-affected

1.7.1.3-1
oneiric

not-affected

1.7.1.3-1
precise

not-affected

1.7.1.3-1

Показывать по

Ссылки на источники

EPSS

Процентиль: 80%
0.01422
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

nvd
больше 15 лет назад

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

debian
больше 15 лет назад

Stack-based buffer overflow in the nestlex function in nestlex.c in So ...

github
больше 3 лет назад

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

EPSS

Процентиль: 80%
0.01422
Низкий

6.8 Medium

CVSS2