Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-0219

Опубликовано: 21 июн. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.2

Описание

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

РелизСтатусПримечание
devel

not-affected

readline disabled/1.7.1.3-1.3
esm-apps/xenial

not-affected

readline disabled/1.7.1.3-1.3
esm-infra-legacy/trusty

not-affected

readline disabled/1.7.1.3-1.3
hardy

ignored

end of life
lucid

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life

Показывать по

EPSS

Процентиль: 39%
0.00172
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

nvd
больше 13 лет назад

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

debian
больше 13 лет назад

Heap-based buffer overflow in the xioscan_readline function in xio-rea ...

github
почти 4 года назад

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

EPSS

Процентиль: 39%
0.00172
Низкий

6.2 Medium

CVSS2