Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443 - | |
References | () http://bugs.gentoo.org/show_bug.cgi?id=330785 - | |
References | () http://www.debian.org/security/2010/dsa-2090 - | |
References | () http://www.dest-unreach.org/socat/contrib/socat-secadv2.html - Vendor Advisory | |
References | () http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch - Patch | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=620426 - |
Information
Published : 2010-09-14 21:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2799
Mitre link : CVE-2010-2799
CVE.ORG link : CVE-2010-2799
JSON object : View
Products Affected
dest-unreach
- socat
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer