Vulnerabilites related to dest-unreach - socat
Vulnerability from fkie_nvd
Published
2017-06-08 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dest-unreach | socat | * | |
| dest-unreach | socat | 2.0.0-b8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88B415A1-B1B3-4845-A2ED-B0735AC4A5C2",
"versionEndIncluding": "1.7.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0-b8:*:*:*:*:*:*:*",
"matchCriteriaId": "F2861C5A-DC2B-4A26-B691-9EA78218C503",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash)."
},
{
"lang": "es",
"value": "Las implementaciones del manejador de se\u00f1al en socat, versiones anteriores a la 1.7.3.0 y a la 2.0.0-b8 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo o ca\u00edda de proceso)."
}
],
"id": "CVE-2015-1379",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-06-08T21:29:00.190",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.dest-unreach.org/socat/"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2015/01/27/19"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/06/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/72321"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.dest-unreach.org/socat/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2015/01/27/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/06/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/72321"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2014-02-04 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| fedoraproject | fedora | 19 | |
| fedoraproject | fedora | 20 | |
| opensuse | opensuse | 13.1 | |
| dest-unreach | socat | 1.3.0.0 | |
| dest-unreach | socat | 1.3.0.1 | |
| dest-unreach | socat | 1.3.1.0 | |
| dest-unreach | socat | 1.3.2.0 | |
| dest-unreach | socat | 1.3.2.1 | |
| dest-unreach | socat | 1.3.2.2 | |
| dest-unreach | socat | 1.4.0.0 | |
| dest-unreach | socat | 1.4.0.1 | |
| dest-unreach | socat | 1.4.0.2 | |
| dest-unreach | socat | 1.4.0.3 | |
| dest-unreach | socat | 1.4.1.0 | |
| dest-unreach | socat | 1.4.2.0 | |
| dest-unreach | socat | 1.4.3.0 | |
| dest-unreach | socat | 1.4.3.1 | |
| dest-unreach | socat | 1.5.0.0 | |
| dest-unreach | socat | 1.6.0.0 | |
| dest-unreach | socat | 1.6.0.1 | |
| dest-unreach | socat | 1.7.0.0 | |
| dest-unreach | socat | 1.7.0.1 | |
| dest-unreach | socat | 1.7.1.0 | |
| dest-unreach | socat | 1.7.1.1 | |
| dest-unreach | socat | 1.7.1.2 | |
| dest-unreach | socat | 1.7.1.3 | |
| dest-unreach | socat | 1.7.2.0 | |
| dest-unreach | socat | 1.7.2.1 | |
| dest-unreach | socat | 1.7.2.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "07DE8F2A-AE2C-4EE9-80BE-2B77334ACE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "DDEB3CA6-8B73-4D4D-BF77-D0B9974620F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "54BBDF18-0939-41CD-B26A-661CB1F9CF9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6618A30F-2FC9-48D0-8C70-F12748F83D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF45DB7D-2751-4709-9240-25A8335A82B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5CDC9F84-2E18-4D1C-9E74-718CD174C543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ECD914-987C-4B8D-A985-C6E68749CA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF894DA-EC5E-43E0-B88F-764AA0A6C238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C77701F-CC50-44B9-8C98-26E75AF562B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "484E84E3-C649-4927-800B-BC41B62CDC66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6155431A-7487-46D9-8F32-185C198CD2BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C191EDF-E53C-4E37-8ED4-488B23C844D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "64E2E694-D2BF-4E35-B65E-7DD020B76972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13D897B0-BCBF-4670-82C6-AD877C5EC167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "324DB41F-9A19-4BDB-9187-13EFA0902785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57E632D6-3B7A-49C0-B320-2AB4094ECF98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BDC15BD-7398-4108-A598-662CA955F644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17BEC895-BD41-42D5-B82A-72F81D30E776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F35F95-B83A-4ED0-B40C-8E1C513F37A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF36D5D-1FD1-4484-8481-19E1E9F5571A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A38BE461-2B65-495D-8D5E-BEAE29AC1040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6D4EC384-DA4A-475F-BF36-7092BEB79C2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line."
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en pila en Socat 1.3.0.0 hasta 1.7.2.2 y 2.0.0-b1 hasta 2.0.0-b6 permite a usuarios locales causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) a trav\u00e9s de un nombre de servidor largo en la direcci\u00f3n PROXY-CONNECT en la l\u00ednea de comandos."
}
],
"id": "CVE-2014-0019",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-02-04T21:55:05.263",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/102612"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://seclists.org/oss-sec/2014/q1/159"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.dest-unreach.org/socat"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/65201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/102612"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://seclists.org/oss-sec/2014/q1/159"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.dest-unreach.org/socat"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/65201"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2010-09-14 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dest-unreach | socat | 1.5.0.0 | |
| dest-unreach | socat | 1.6.0.0 | |
| dest-unreach | socat | 1.6.0.1 | |
| dest-unreach | socat | 1.7.0.0 | |
| dest-unreach | socat | 1.7.0.1 | |
| dest-unreach | socat | 1.7.1.0 | |
| dest-unreach | socat | 1.7.1.1 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n nestlex en nestlex.c en Socat 1.5.0.0 a 1.7.1.2 y 2.0.0-b1 a 2.0.0-b3, cuando el reenv\u00edo bidireccional de datos est\u00e1 habilitado, permite a atacantes dependientes del contexto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos de l\u00ednea de comandos largos."
}
],
"id": "CVE-2010-2799",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-09-14T21:00:01.703",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443"
},
{
"source": "secalert@redhat.com",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=330785"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2010/dsa-2090"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=330785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2010/dsa-2090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/msmania/poodim/commit/6340d5d2c81e55e61522c4b40a6cdd5c39738cc6"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2012-06-21 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dest-unreach | socat | 1.4.0.0 | |
| dest-unreach | socat | 1.4.0.1 | |
| dest-unreach | socat | 1.4.0.2 | |
| dest-unreach | socat | 1.4.0.3 | |
| dest-unreach | socat | 1.4.1.0 | |
| dest-unreach | socat | 1.4.2.0 | |
| dest-unreach | socat | 1.4.3.1 | |
| dest-unreach | socat | 1.5.0.0 | |
| dest-unreach | socat | 1.6.0.0 | |
| dest-unreach | socat | 1.6.0.1 | |
| dest-unreach | socat | 1.7.0.0 | |
| dest-unreach | socat | 1.7.0.1 | |
| dest-unreach | socat | 1.7.1.0 | |
| dest-unreach | socat | 1.7.1.1 | |
| dest-unreach | socat | 1.7.1.2 | |
| dest-unreach | socat | 1.7.1.3 | |
| dest-unreach | socat | 1.7.2.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "484E84E3-C649-4927-800B-BC41B62CDC66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6155431A-7487-46D9-8F32-185C198CD2BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C191EDF-E53C-4E37-8ED4-488B23C844D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "64E2E694-D2BF-4E35-B65E-7DD020B76972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13D897B0-BCBF-4670-82C6-AD877C5EC167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "324DB41F-9A19-4BDB-9187-13EFA0902785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BDC15BD-7398-4108-A598-662CA955F644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17BEC895-BD41-42D5-B82A-72F81D30E776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F35F95-B83A-4ED0-B40C-8E1C513F37A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF36D5D-1FD1-4484-8481-19E1E9F5571A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "07DE8F2A-AE2C-4EE9-80BE-2B77334ACE9D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address."
},
{
"lang": "es",
"value": "Desbordamiento de bufer basado en memoria din\u00e1mica (heap) en la funci\u00f3n xioscan_readline en xio-readline.c en socat v1.4.0.0 a v1.7.2.0 y v2.0.0-b1 a v2.0.0-b4 permite a usuarios locales ejecutar c\u00f3digo de sus elecci\u00f3n a trav\u00e9s de la direcci\u00f3n READLINE."
}
],
"id": "CVE-2012-0219",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 1.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-06-21T15:55:11.207",
"references": [
{
"source": "security@debian.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html"
},
{
"source": "security@debian.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html"
},
{
"source": "security@debian.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/49105"
},
{
"source": "security@debian.org",
"url": "http://secunia.com/advisories/49746"
},
{
"source": "security@debian.org",
"url": "http://security.gentoo.org/glsa/glsa-201208-01.xml"
},
{
"source": "security@debian.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html"
},
{
"source": "security@debian.org",
"url": "http://www.lwn.net/Articles/504742/"
},
{
"source": "security@debian.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"source": "security@debian.org",
"url": "http://www.openwall.com/lists/oss-security/2012/05/14/2"
},
{
"source": "security@debian.org",
"url": "http://www.osvdb.org/81969"
},
{
"source": "security@debian.org",
"url": "http://www.securityfocus.com/bid/53510"
},
{
"source": "security@debian.org",
"url": "http://www.securitytracker.com/id?1027064"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/49105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/49746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201208-01.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.lwn.net/Articles/504742/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/05/14/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/81969"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/53510"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1027064"
}
],
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2017-01-30 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| cve@mitre.org | http://www.dest-unreach.org/socat/contrib/socat-secadv7.html | Patch, Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/02/01/4 | Mailing List, Patch, Third Party Advisory | |
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/02/04/1 | Third Party Advisory | |
| cve@mitre.org | https://security.gentoo.org/glsa/201612-23 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.dest-unreach.org/socat/contrib/socat-secadv7.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/02/01/4 | Mailing List, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/02/04/1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201612-23 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dest-unreach | socat | 1.7.3.0 | |
| dest-unreach | socat | 2.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E98265-AE64-4C62-A138-370C7A30E39A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "6AFF8CA8-2FD9-48A9-B8BB-B1FE26D48865",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret."
},
{
"lang": "es",
"value": "La implementaci\u00f3n de direcciones OpenSSL en Socat 1.7.3.0 y 2.0.0-b8 no utiliza un n\u00famero primo para el DH, lo que facilita a los atacantes remotos obtener el secreto compartido."
}
],
"id": "CVE-2016-2217",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-01-30T22:59:00.310",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/01/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/04/1"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201612-23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/01/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/04/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201612-23"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-320"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2014-05-08 14:29
Modified
2025-04-12 10:46
Severity ?
Summary
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dest-unreach | socat | 1.2.0.0 | |
| dest-unreach | socat | 1.3.0.0 | |
| dest-unreach | socat | 1.3.0.1 | |
| dest-unreach | socat | 1.3.1.0 | |
| dest-unreach | socat | 1.3.2.0 | |
| dest-unreach | socat | 1.3.2.1 | |
| dest-unreach | socat | 1.3.2.2 | |
| dest-unreach | socat | 1.4.0.0 | |
| dest-unreach | socat | 1.4.0.1 | |
| dest-unreach | socat | 1.4.0.2 | |
| dest-unreach | socat | 1.4.0.3 | |
| dest-unreach | socat | 1.4.1.0 | |
| dest-unreach | socat | 1.4.2.0 | |
| dest-unreach | socat | 1.4.3.0 | |
| dest-unreach | socat | 1.4.3.1 | |
| dest-unreach | socat | 1.5.0.0 | |
| dest-unreach | socat | 1.6.0.0 | |
| dest-unreach | socat | 1.6.0.1 | |
| dest-unreach | socat | 1.7.0.0 | |
| dest-unreach | socat | 1.7.0.1 | |
| dest-unreach | socat | 1.7.1.0 | |
| dest-unreach | socat | 1.7.1.1 | |
| dest-unreach | socat | 1.7.1.2 | |
| dest-unreach | socat | 1.7.1.3 | |
| dest-unreach | socat | 1.7.2.0 | |
| dest-unreach | socat | 1.7.2.1 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 | |
| dest-unreach | socat | 2.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF4F3C1-1CE9-44BC-B510-1802E57B6680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6618A30F-2FC9-48D0-8C70-F12748F83D2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CF45DB7D-2751-4709-9240-25A8335A82B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5CDC9F84-2E18-4D1C-9E74-718CD174C543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ECD914-987C-4B8D-A985-C6E68749CA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF894DA-EC5E-43E0-B88F-764AA0A6C238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C77701F-CC50-44B9-8C98-26E75AF562B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "484E84E3-C649-4927-800B-BC41B62CDC66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6155431A-7487-46D9-8F32-185C198CD2BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C191EDF-E53C-4E37-8ED4-488B23C844D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "64E2E694-D2BF-4E35-B65E-7DD020B76972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13D897B0-BCBF-4670-82C6-AD877C5EC167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "324DB41F-9A19-4BDB-9187-13EFA0902785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "57E632D6-3B7A-49C0-B320-2AB4094ECF98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BDC15BD-7398-4108-A598-662CA955F644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43189B21-C2E3-4066-82A1-456344B10131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DA6703-CECF-4456-B8F6-18888629C122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6320B213-6E09-4A64-9C44-3565A6006C74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4C577A55-72B0-4F75-B7A3-558DBF2B7BFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "34FFD979-165A-4465-8CCD-BA6CCEDC0016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B7B050A1-ECDE-47E8-8B7D-6AFD3923BA49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D82983A5-0BBF-4131-AF82-1036FAFC0ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17BEC895-BD41-42D5-B82A-72F81D30E776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F35F95-B83A-4ED0-B40C-8E1C513F37A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF36D5D-1FD1-4484-8481-19E1E9F5571A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:1.7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A38BE461-2B65-495D-8D5E-BEAE29AC1040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "7BE19927-5110-4C8D-8E3E-C075CA61023B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "9F7C7910-5259-40D9-848D-402017952540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "3E50A8D8-00A8-4578-85ED-C3A11A9CA955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "07DE8F2A-AE2C-4EE9-80BE-2B77334ACE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "DDEB3CA6-8B73-4D4D-BF77-D0B9974620F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions."
},
{
"lang": "es",
"value": "socat 1.2.0.0 anterior a 1.7.2.2 y 2.0.0-b1 anterior a 2.0.0-b6, cuando se utiliza para una direcci\u00f3n tipo escucha y la opci\u00f3n de bifurcaci\u00f3n est\u00e1 habilitada, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de descriptor de archivos) a trav\u00e9s de solicitudes m\u00faltiples que est\u00e1n denegadas bas\u00e1ndose en las restricciones (1) sourceport, (2) lowport, (3) range o (4) tcpwrap."
}
],
"id": "CVE-2013-3571",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-05-08T14:29:08.957",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2013/05/26/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/05/26/1"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2016-2217 (GCVE-0-2016-2217)
Vulnerability from cvelistv5
Published
2017-01-30 22:00
Modified
2024-08-05 23:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret.
References
| ▼ | URL | Tags |
|---|---|---|
| https://security.gentoo.org/glsa/201612-23 | vendor-advisory, x_refsource_GENTOO | |
| http://www.dest-unreach.org/socat/contrib/socat-secadv7.html | x_refsource_CONFIRM | |
| http://www.openwall.com/lists/oss-security/2016/02/04/1 | mailing-list, x_refsource_MLIST | |
| http://www.openwall.com/lists/oss-security/2016/02/01/4 | mailing-list, x_refsource_MLIST |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T23:24:48.475Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-201612-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201612-23"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html"
},
{
"name": "[oss-security] 20160203 Re: Socat security advisory 7 - Created new 2048bit DH modulus",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/04/1"
},
{
"name": "[oss-security] 20160201 Socat security advisory 7 - Created new 2048bit DH modulus",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/01/4"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-02-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-06-30T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "GLSA-201612-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201612-23"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html"
},
{
"name": "[oss-security] 20160203 Re: Socat security advisory 7 - Created new 2048bit DH modulus",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/04/1"
},
{
"name": "[oss-security] 20160201 Socat security advisory 7 - Created new 2048bit DH modulus",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/02/01/4"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-2217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does not use a prime number for the DH, which makes it easier for remote attackers to obtain the shared secret."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201612-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-23"
},
{
"name": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html",
"refsource": "CONFIRM",
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv7.html"
},
{
"name": "[oss-security] 20160203 Re: Socat security advisory 7 - Created new 2048bit DH modulus",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/02/04/1"
},
{
"name": "[oss-security] 20160201 Socat security advisory 7 - Created new 2048bit DH modulus",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/02/01/4"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-2217",
"datePublished": "2017-01-30T22:00:00",
"dateReserved": "2016-02-03T00:00:00",
"dateUpdated": "2024-08-05T23:24:48.475Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0019 (GCVE-0-2014-0019)
Vulnerability from cvelistv5
Published
2014-02-04 16:00
Modified
2024-08-06 08:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
References
| ▼ | URL | Tags |
|---|---|---|
| http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html | vendor-advisory, x_refsource_FEDORA | |
| http://www.mandriva.com/security/advisories?name=MDVSA-2014:033 | vendor-advisory, x_refsource_MANDRIVA | |
| http://www.securityfocus.com/bid/65201 | vdb-entry, x_refsource_BID | |
| http://osvdb.org/102612 | vdb-entry, x_refsource_OSVDB | |
| http://seclists.org/oss-sec/2014/q1/159 | mailing-list, x_refsource_MLIST | |
| http://www.dest-unreach.org/socat | x_refsource_CONFIRM | |
| http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt | x_refsource_MISC | |
| http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html | vendor-advisory, x_refsource_SUSE | |
| http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html | vendor-advisory, x_refsource_FEDORA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T08:58:26.559Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2014-1795",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
},
{
"name": "MDVSA-2014:033",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
},
{
"name": "65201",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/65201"
},
{
"name": "102612",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/102612"
},
{
"name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://seclists.org/oss-sec/2014/q1/159"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
},
{
"name": "openSUSE-SU-2015:0760",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
},
{
"name": "FEDORA-2014-1811",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-01-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-04-30T14:57:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "FEDORA-2014-1795",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
},
{
"name": "MDVSA-2014:033",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
},
{
"name": "65201",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/65201"
},
{
"name": "102612",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/102612"
},
{
"name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://seclists.org/oss-sec/2014/q1/159"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.dest-unreach.org/socat"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
},
{
"name": "openSUSE-SU-2015:0760",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
},
{
"name": "FEDORA-2014-1811",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0019",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2014-1795",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html"
},
{
"name": "MDVSA-2014:033",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:033"
},
{
"name": "65201",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65201"
},
{
"name": "102612",
"refsource": "OSVDB",
"url": "http://osvdb.org/102612"
},
{
"name": "[oss-security] 20140128 Socat security advisory 5 - PROXY-CONNECT address overflow",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q1/159"
},
{
"name": "http://www.dest-unreach.org/socat",
"refsource": "CONFIRM",
"url": "http://www.dest-unreach.org/socat"
},
{
"name": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt",
"refsource": "MISC",
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt"
},
{
"name": "openSUSE-SU-2015:0760",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html"
},
{
"name": "FEDORA-2014-1811",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2014-0019",
"datePublished": "2014-02-04T16:00:00",
"dateReserved": "2013-12-03T00:00:00",
"dateUpdated": "2024-08-06T08:58:26.559Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-3571 (GCVE-0-2013-3571)
Vulnerability from cvelistv5
Published
2014-05-08 14:00
Modified
2024-08-06 16:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
References
| ▼ | URL | Tags |
|---|---|---|
| http://www.dest-unreach.org/socat/contrib/socat-secadv4.html | x_refsource_CONFIRM | |
| http://www.mandriva.com/security/advisories?name=MDVSA-2013:169 | vendor-advisory, x_refsource_MANDRIVA | |
| http://www.openwall.com/lists/oss-security/2013/05/26/1 | mailing-list, x_refsource_MLIST |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:14:56.235Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html"
},
{
"name": "MDVSA-2013:169",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"name": "[oss-security] 20130526 socat security advisory 4 - CVE-2013-3571",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/05/26/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-05-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-08T12:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html"
},
{
"name": "MDVSA-2013:169",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"name": "[oss-security] 20130526 socat security advisory 4 - CVE-2013-3571",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/05/26/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-3571",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html",
"refsource": "CONFIRM",
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv4.html"
},
{
"name": "MDVSA-2013:169",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"name": "[oss-security] 20130526 socat security advisory 4 - CVE-2013-3571",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/05/26/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-3571",
"datePublished": "2014-05-08T14:00:00",
"dateReserved": "2013-05-21T00:00:00",
"dateUpdated": "2024-08-06T16:14:56.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-0219 (GCVE-0-2012-0219)
Vulnerability from cvelistv5
Published
2012-06-21 15:00
Modified
2024-08-06 18:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:16:19.401Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "49746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49746"
},
{
"name": "1027064",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1027064"
},
{
"name": "FEDORA-2012-8328",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html"
},
{
"name": "GLSA-201208-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201208-01.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html"
},
{
"name": "FEDORA-2012-8274",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html"
},
{
"name": "openSUSE-SU-2012:0809",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.lwn.net/Articles/504742/"
},
{
"name": "53510",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/53510"
},
{
"name": "MDVSA-2013:169",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"name": "81969",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/81969"
},
{
"name": "49105",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/49105"
},
{
"name": "[oss-security] 20120514 socat security advisory",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/05/14/2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-05-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-05-08T12:57:00",
"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"shortName": "debian"
},
"references": [
{
"name": "49746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49746"
},
{
"name": "1027064",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1027064"
},
{
"name": "FEDORA-2012-8328",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html"
},
{
"name": "GLSA-201208-01",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201208-01.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html"
},
{
"name": "FEDORA-2012-8274",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html"
},
{
"name": "openSUSE-SU-2012:0809",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.lwn.net/Articles/504742/"
},
{
"name": "53510",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/53510"
},
{
"name": "MDVSA-2013:169",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"name": "81969",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/81969"
},
{
"name": "49105",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/49105"
},
{
"name": "[oss-security] 20120514 socat security advisory",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/05/14/2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2012-0219",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "49746",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49746"
},
{
"name": "1027064",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027064"
},
{
"name": "FEDORA-2012-8328",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html"
},
{
"name": "GLSA-201208-01",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201208-01.xml"
},
{
"name": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html",
"refsource": "CONFIRM",
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv3.html"
},
{
"name": "FEDORA-2012-8274",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html"
},
{
"name": "openSUSE-SU-2012:0809",
"refsource": "SUSE",
"url": "http://www.lwn.net/Articles/504742/"
},
{
"name": "53510",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53510"
},
{
"name": "MDVSA-2013:169",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:169"
},
{
"name": "81969",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/81969"
},
{
"name": "49105",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/49105"
},
{
"name": "[oss-security] 20120514 socat security advisory",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/05/14/2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"assignerShortName": "debian",
"cveId": "CVE-2012-0219",
"datePublished": "2012-06-21T15:00:00",
"dateReserved": "2011-12-14T00:00:00",
"dateUpdated": "2024-08-06T18:16:19.401Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-1379 (GCVE-0-2015-1379)
Vulnerability from cvelistv5
Published
2017-06-08 21:00
Modified
2024-08-06 04:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
References
| ▼ | URL | Tags |
|---|---|---|
| http://www.dest-unreach.org/socat/ | x_refsource_CONFIRM | |
| http://www.openwall.com/lists/oss-security/2015/04/06/4 | mailing-list, x_refsource_MLIST | |
| http://www.securityfocus.com/bid/72321 | vdb-entry, x_refsource_BID | |
| http://www.openwall.com/lists/oss-security/2015/01/27/19 | mailing-list, x_refsource_MLIST | |
| https://bugzilla.redhat.com/show_bug.cgi?id=1185711 | x_refsource_CONFIRM |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:40:18.602Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat/"
},
{
"name": "[oss-security] 20150406 Socat security advisory 6 - Possible DoS with fork (update: CVE-Id: CVE-2015-1379; fix for version 2)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/06/4"
},
{
"name": "72321",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72321"
},
{
"name": "[oss-security] 20150127 Re: Socat security advisory 6 - Possible DoS with fork",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2015/01/27/19"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-06-08T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.dest-unreach.org/socat/"
},
{
"name": "[oss-security] 20150406 Socat security advisory 6 - Possible DoS with fork (update: CVE-Id: CVE-2015-1379; fix for version 2)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/04/06/4"
},
{
"name": "72321",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72321"
},
{
"name": "[oss-security] 20150127 Re: Socat security advisory 6 - Possible DoS with fork",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2015/01/27/19"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-1379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.dest-unreach.org/socat/",
"refsource": "CONFIRM",
"url": "http://www.dest-unreach.org/socat/"
},
{
"name": "[oss-security] 20150406 Socat security advisory 6 - Possible DoS with fork (update: CVE-Id: CVE-2015-1379; fix for version 2)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/04/06/4"
},
{
"name": "72321",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72321"
},
{
"name": "[oss-security] 20150127 Re: Socat security advisory 6 - Possible DoS with fork",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2015/01/27/19"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185711"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-1379",
"datePublished": "2017-06-08T21:00:00",
"dateReserved": "2015-01-27T00:00:00",
"dateUpdated": "2024-08-06T04:40:18.602Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-54661 (GCVE-0-2024-54661)
Vulnerability from cvelistv5
Published
2024-12-04 00:00
Modified
2025-01-09 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-61 - UNIX Symbolic Link (Symlink) Following
Summary
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| dest-unreach | socat |
Version: 1.6.0.0 < 1.8.0.2 Version: 2.0.0-b1 < |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "socat",
"vendor": "dest-unreach",
"versions": [
{
"lessThanOrEqual": "1.8.0.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-54661",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T14:54:07.899241Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-09T16:30:38.380Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "socat",
"vendor": "dest-unreach",
"versions": [
{
"lessThan": "1.8.0.2",
"status": "affected",
"version": "1.6.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.0.0-b9",
"status": "affected",
"version": "2.0.0-b1",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.8.0.2",
"versionStartIncluding": "1.6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dest-unreach:socat:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.0-b9",
"versionStartIncluding": "2.0.0-b1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-61",
"description": "CWE-61 UNIX Symbolic Link (Symlink) Following",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-07T01:00:11.506Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://repo.or.cz/socat.git/blob/6ff391324d2d3b9f6bfb58e7d16a20be43b47af7:/readline.sh#l29"
},
{
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv9.html"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-54661",
"datePublished": "2024-12-04T00:00:00",
"dateReserved": "2024-12-04T00:00:00",
"dateUpdated": "2025-01-09T16:30:38.380Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-2799 (GCVE-0-2010-2799)
Vulnerability from cvelistv5
Published
2010-09-14 20:03
Modified
2024-09-25 22:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
References
| ▼ | URL | Tags |
|---|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=620426 | x_refsource_CONFIRM | |
| http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch | x_refsource_CONFIRM | |
| http://www.dest-unreach.org/socat/contrib/socat-secadv2.html | x_refsource_CONFIRM | |
| http://bugs.gentoo.org/show_bug.cgi?id=330785 | x_refsource_CONFIRM | |
| http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443 | x_refsource_CONFIRM | |
| http://www.debian.org/security/2010/dsa-2090 | vendor-advisory, x_refsource_DEBIAN |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-09-25T22:46:51.804Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://github.com/msmania/poodim/commit/6340d5d2c81e55e61522c4b40a6cdd5c39738cc6"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=330785"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443"
},
{
"name": "DSA-2090",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2090"
}
],
"title": "CVE Program Container",
"x_generator": {
"engine": "ADPogram 0.0.1"
}
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-14T20:03:00Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=620426"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.dest-unreach.org/socat/contrib/socat-secadv2.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=330785"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443"
},
{
"name": "DSA-2090",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2090"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-2799",
"datePublished": "2010-09-14T20:03:00Z",
"dateReserved": "2010-07-22T00:00:00Z",
"dateUpdated": "2024-09-25T22:46:51.804Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}