socat is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
Credit:
The information has been provided by Johan Thillemann .
The original article can be found at: http://www.securityfocus.com/bid/53510
Vulnerable Systems:
* socat socat 2.0.0-b4
* socat socat 2.0.0-b3
* socat socat 2.0.0-b2
* socat socat 2.0.0-b1
* socat socat 1.7.2.0
Immune Systems:
* socat socat 2.0.0-b5
* socat socat 1.7.2.1
Attackers can leverage this issue to execute arbitrary code with the privileges of the socat process. Failed attacks will cause denial-of-service conditions.
Vendor Status:
Socat had issued an update for this vulnerability
Patch Availability:
http://www.dest-unreach.org/socat/
CVE Information:
CVE-2012-0219
Disclosure Timeline:
Initial Release: May 14 2012
Please enable JavaScript to view the comments powered by Disqus.
blog comments powered by