Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 up to and including 1.7.2.0 and 2.0.0-b1 up to and including 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dest-unreach socat 1.4.0.3 |
||
dest-unreach socat 1.4.1.0 |
||
dest-unreach socat 1.4.2.0 |
||
dest-unreach socat 1.7.1.0 |
||
dest-unreach socat 1.7.1.1 |
||
dest-unreach socat 1.4.3.1 |
||
dest-unreach socat 1.5.0.0 |
||
dest-unreach socat 1.7.1.2 |
||
dest-unreach socat 1.7.1.3 |
||
dest-unreach socat 1.4.0.0 |
||
dest-unreach socat 1.6.0.0 |
||
dest-unreach socat 1.6.0.1 |
||
dest-unreach socat 1.7.2.0 |
||
dest-unreach socat 1.4.0.1 |
||
dest-unreach socat 1.4.0.2 |
||
dest-unreach socat 1.7.0.0 |
||
dest-unreach socat 1.7.0.1 |
||
dest-unreach socat 2.0.0 |