Computer Security
[EN] securityvulns.ru no-pyccku


socat buffer overflow
Published:09.08.2010
Source:
SecurityVulns ID:11046
Type:local
Threat Level:
3/10
Description:Buffer overflow on command line arguments parsing.
Affected:SOCAT : socat 1.7
CVE:CVE-2010-2799 (Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2090-1] New socat packages fix arbitrary code execution (09.08.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod