5
CVSSv2

CVE-2004-1484

Published: 31/12/2004 Updated: 11/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and previous versions, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.

Vulnerable Product Search on Vulmon Subscribe to Product

socat socat 1.1.0.0

socat socat 1.1.0.1

socat socat 1.4.0.0

socat socat 1.4.0.1

socat socat 1.2.0.0

socat socat 1.3.0.0

socat socat 1.4.0.2

socat socat 1.0.3.0

socat socat 1.0.4.0

socat socat 1.3.0.1

socat socat 1.3.1.0

socat socat 1.3.2.0

socat socat 1.0.4.1

socat socat 1.0.4.2

socat socat 1.3.2.1

socat socat 1.3.2.2

Exploits

/* socat_expc Socat Format String Vulnerability socat <= 1402 local exploit (Proof of Concept) Tested in Slackware 90 / 91 / 100 by CoKi <coki@nosystemcomar> No System Group - wwwnosystemcomar coki@servidor:~$ make socat_exp coki@servidor:~$ /socat_exp socat <= 1402 local exploit (Proof of ...