Sunday, September 19, 2010

socat: Stack-based buffer overflow

Users of socat please be advised of a Stack-based buffer overflow vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
MDVSA-2010:183: [MDVSA-2010:183] socat Stack-based buffer overflow
Problem Description:



A vulnerability has been found and corrected in socat:



Stack-based buffer overflow in the nestlex function in nestlex.c

in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3,

when bidirectional data relay is enabled, allows context-dependent

attackers to execute arbitrary code via long command-line arguments

(CVE-2010-2799).
Read more at www.criticalwatch.com
 

No comments:

Post a Comment