#VU43968 Heap-based buffer overflow in socat - CVE-2012-0219
Published: June 21, 2012 / Updated: August 11, 2020
socat
www.dest-unreach.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4. A remote attacker can use the READLINE address. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html
- http://secunia.com/advisories/49105
- http://secunia.com/advisories/49746
- http://security.gentoo.org/glsa/glsa-201208-01.xml
- http://www.dest-unreach.org/socat/contrib/socat-secadv3.html
- http://www.lwn.net/Articles/504742/
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:169
- http://www.openwall.com/lists/oss-security/2012/05/14/2
- http://www.osvdb.org/81969
- http://www.securityfocus.com/bid/53510
- http://www.securitytracker.com/id?1027064