6.8
CVSSv2

CVE-2010-2799

Published: 14/09/2010 Updated: 15/09/2010
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 up to and including 1.7.1.2 and 2.0.0-b1 up to and including 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent malicious users to execute arbitrary code via long command-line arguments.

Vulnerable Product Search on Vulmon Subscribe to Product

dest-unreach socat 1.5.0.0

dest-unreach socat 1.6.0.0

dest-unreach socat 1.6.0.1

dest-unreach socat 1.7.0.0

dest-unreach socat 1.7.1.0

dest-unreach socat 2.0.0

dest-unreach socat 1.7.0.1

dest-unreach socat 1.7.1.1

Vendor Advisories

Debian Bug report logs - #591443 CVE-2010-2799: Stack overflow by lexical scanning of nested character patterns Package: socat; Maintainer for socat is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for socat is src:socat (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 3 Aug 2010 ...
A stack overflow vulnerability was found in socat that allows an attacker to execute arbitrary code with the privileges of the socat process This vulnerability can only be exploited when an attacker is able to inject more than 512 bytes of data into socat's argument A vulnerable scenario would be a CGI script that reads data from clients and uses ...