2.6
CVSSv2

CVE-2013-3571

Published: 08/05/2014 Updated: 09/05/2014
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Summary

socat 1.2.0.0 prior to 1.7.2.2 and 2.0.0-b1 prior to 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote malicious users to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dest-unreach socat 2.0.0

dest-unreach socat 1.4.0.1

dest-unreach socat 1.4.0.2

dest-unreach socat 1.4.0.3

dest-unreach socat 1.4.1.0

dest-unreach socat 1.7.0.0

dest-unreach socat 1.7.1.0

dest-unreach socat 1.6.0.1

dest-unreach socat 1.4.0.0

dest-unreach socat 1.4.2.0

dest-unreach socat 1.4.3.1

dest-unreach socat 1.3.0.1

dest-unreach socat 1.2.0.0

dest-unreach socat 1.7.0.1

dest-unreach socat 1.7.1.1

dest-unreach socat 1.6.0.0

dest-unreach socat 1.5.0.0

dest-unreach socat 1.4.3.0

dest-unreach socat 1.3.0.0

dest-unreach socat 1.7.1.2

dest-unreach socat 1.7.1.3

dest-unreach socat 1.7.2.0

dest-unreach socat 1.7.2.1

dest-unreach socat 1.3.1.0

dest-unreach socat 1.3.2.0

dest-unreach socat 1.3.2.1

dest-unreach socat 1.3.2.2

Vendor Advisories

Debian Bug report logs - #709931 socat: CVE-2013-3571: file descriptor leak Package: socat; Maintainer for socat is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for socat is src:socat (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 26 May 2013 20:39:02 UTC Severity: import ...
socat 1200 before 1722 and 200-b1 before 200-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions ...