Описание
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | readline disabled/1.7.1.3-1.3 |
| esm-apps/xenial | not-affected | readline disabled/1.7.1.3-1.3 |
| esm-infra-legacy/trusty | not-affected | readline disabled/1.7.1.3-1.3 |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| natty | ignored | end of life |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | ignored | end of life |
Показывать по
EPSS
6.2 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
Heap-based buffer overflow in the xioscan_readline function in xio-rea ...
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
EPSS
6.2 Medium
CVSS2