Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-0019 from the MITRE CVE dictionary dictionary and NIST NVD.
The Red Hat Security Response Team has rated this issue as having Low security impact on OpenShift Enterprise, a future update may address this flaw.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 2.6 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat OpenShift Enterprise 2 | socat | Will not fix |
Red Hat Enterprise Linux 7 | socat | Not affected |