6.2
CVSSv2

CVE-2012-0219

Published: 21/06/2012 Updated: 10/05/2014
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 552
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 up to and including 1.7.2.0 and 2.0.0-b1 up to and including 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.

Vulnerable Product Search on Vulmon Subscribe to Product

dest-unreach socat 1.4.0.3

dest-unreach socat 1.4.1.0

dest-unreach socat 1.4.2.0

dest-unreach socat 1.7.1.0

dest-unreach socat 1.7.1.1

dest-unreach socat 1.4.3.1

dest-unreach socat 1.5.0.0

dest-unreach socat 1.7.1.2

dest-unreach socat 1.7.1.3

dest-unreach socat 1.4.0.0

dest-unreach socat 1.6.0.0

dest-unreach socat 1.6.0.1

dest-unreach socat 1.7.2.0

dest-unreach socat 1.4.0.1

dest-unreach socat 1.4.0.2

dest-unreach socat 1.7.0.0

dest-unreach socat 1.7.0.1

dest-unreach socat 2.0.0

Vendor Advisories

Debian Bug report logs - #672994 CVE-2012-0219: buffer overflow Package: socat; Maintainer for socat is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for socat is src:socat (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Tue, 15 May 2012 10:33:02 UTC Severity: grave Tags: ...
Heap-based buffer overflow in the xioscan_readline function in xio-readlinec in socat 1400 through 1720 and 200-b1 through 200-b4 allows local users to execute arbitrary code via the READLINE address ...