Stack-based buffer overflow in socat 1.3.0.0 up to and including 1.7.2.2 and 2.0.0-b1 up to and including 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dest-unreach socat 2.0.0 |
||
fedoraproject fedora 20 |
||
fedoraproject fedora 19 |
||
opensuse opensuse 13.1 |
||
dest-unreach socat 1.3.2.0 |
||
dest-unreach socat 1.7.1.1 |
||
dest-unreach socat 1.7.0.0 |
||
dest-unreach socat 1.5.0.0 |
||
dest-unreach socat 1.7.1.2 |
||
dest-unreach socat 1.3.2.2 |
||
dest-unreach socat 1.6.0.0 |
||
dest-unreach socat 1.7.1.0 |
||
dest-unreach socat 1.4.0.2 |
||
dest-unreach socat 1.4.0.0 |
||
dest-unreach socat 1.4.2.0 |
||
dest-unreach socat 1.4.0.3 |
||
dest-unreach socat 1.3.0.1 |
||
dest-unreach socat 1.4.3.0 |
||
dest-unreach socat 1.7.2.1 |
||
dest-unreach socat 1.7.2.2 |
||
dest-unreach socat 1.6.0.1 |
||
dest-unreach socat 1.4.3.1 |
||
dest-unreach socat 1.3.2.1 |
||
dest-unreach socat 1.7.0.1 |
||
dest-unreach socat 1.7.2.0 |
||
dest-unreach socat 1.3.1.0 |
||
dest-unreach socat 1.7.1.3 |
||
dest-unreach socat 1.4.1.0 |
||
dest-unreach socat 1.3.0.0 |
||
dest-unreach socat 1.4.0.1 |