1.9
CVSSv2

CVE-2014-0019

Published: 04/02/2014 Updated: 30/10/2018
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Stack-based buffer overflow in socat 1.3.0.0 up to and including 1.7.2.2 and 2.0.0-b1 up to and including 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dest-unreach socat 2.0.0

fedoraproject fedora 20

fedoraproject fedora 19

opensuse opensuse 13.1

dest-unreach socat 1.3.2.0

dest-unreach socat 1.7.1.1

dest-unreach socat 1.7.0.0

dest-unreach socat 1.5.0.0

dest-unreach socat 1.7.1.2

dest-unreach socat 1.3.2.2

dest-unreach socat 1.6.0.0

dest-unreach socat 1.7.1.0

dest-unreach socat 1.4.0.2

dest-unreach socat 1.4.0.0

dest-unreach socat 1.4.2.0

dest-unreach socat 1.4.0.3

dest-unreach socat 1.3.0.1

dest-unreach socat 1.4.3.0

dest-unreach socat 1.7.2.1

dest-unreach socat 1.7.2.2

dest-unreach socat 1.6.0.1

dest-unreach socat 1.4.3.1

dest-unreach socat 1.3.2.1

dest-unreach socat 1.7.0.1

dest-unreach socat 1.7.2.0

dest-unreach socat 1.3.1.0

dest-unreach socat 1.7.1.3

dest-unreach socat 1.4.1.0

dest-unreach socat 1.3.0.0

dest-unreach socat 1.4.0.1

Vendor Advisories

Debian Bug report logs - #736993 socat: CVE-2014-0019: PROXY-CONNECT address overflow Package: socat; Maintainer for socat is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for socat is src:socat (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 29 Jan 2014 05:39:02 UTC Severi ...
Stack-based buffer overflow in socat 1300 through 1722 and 200-b1 through 200-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line ...
Stack-based buffer overflow in socat 1300 through 1722 and 200-b1 through 200-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line ...