socat 1.2.0.0 prior to 1.7.2.2 and 2.0.0-b1 prior to 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote malicious users to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dest-unreach socat 2.0.0 |
||
dest-unreach socat 1.4.0.1 |
||
dest-unreach socat 1.4.0.2 |
||
dest-unreach socat 1.4.0.3 |
||
dest-unreach socat 1.4.1.0 |
||
dest-unreach socat 1.7.0.0 |
||
dest-unreach socat 1.7.1.0 |
||
dest-unreach socat 1.6.0.1 |
||
dest-unreach socat 1.4.0.0 |
||
dest-unreach socat 1.4.2.0 |
||
dest-unreach socat 1.4.3.1 |
||
dest-unreach socat 1.3.0.1 |
||
dest-unreach socat 1.2.0.0 |
||
dest-unreach socat 1.7.0.1 |
||
dest-unreach socat 1.7.1.1 |
||
dest-unreach socat 1.6.0.0 |
||
dest-unreach socat 1.5.0.0 |
||
dest-unreach socat 1.4.3.0 |
||
dest-unreach socat 1.3.0.0 |
||
dest-unreach socat 1.7.1.2 |
||
dest-unreach socat 1.7.1.3 |
||
dest-unreach socat 1.7.2.0 |
||
dest-unreach socat 1.7.2.1 |
||
dest-unreach socat 1.3.1.0 |
||
dest-unreach socat 1.3.2.0 |
||
dest-unreach socat 1.3.2.1 |
||
dest-unreach socat 1.3.2.2 |