Executive Summary
Summary | |
---|---|
Title | New socat packages fix arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-2090 | First vendor Publication | 2010-08-06 |
Vendor | Debian | Last vendor Modification | 2010-08-06 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A stack overflow vulnerability was found in socat that allows an attacker to execute arbitrary code with the privileges of the socat process. This vulnerability can only be exploited when an attacker is able to inject more than 512 bytes of data into socat's argument. A vulnerable scenario would be a CGI script that reads data from clients and uses (parts of) this data as argument for a socat invocation. For the stable distribution (lenny), this problem has been fixed in version 1.6.0.1-1+lenny1. For the unstable distribution (sid), this problem has been fixed in version 1.7.1.3-1. We recommend that you upgrade your socat package. |
Original Source
Url : http://www.debian.org/security/2010/dsa-2090 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12303 | |||
Oval ID: | oval:org.mitre.oval:def:12303 | ||
Title: | DSA-2090-1 socat -- incorrect user-input validation | ||
Description: | A stack overflow vulnerability was found in socat that allows an attacker to execute arbitrary code with the privileges of the socat process. This vulnerability can only be exploited when an attacker is able to inject more than 512 bytes of data into socat's argument. A vulnerable scenario would be a CGI script that reads data from clients and uses this data as argument for a socat invocation. For the stable distribution, this problem has been fixed in version 1.6.0.1-1+lenny1. For the unstable distribution, this problem has been fixed in version 1.7.1.3-1. We recommend that you upgrade your socat package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2090-1 CVE-2010-2799 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | socat |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-03-08 | Name : Fedora Update for socat FEDORA-2011-0098 File : nvt/gb_fedora_2011_0098_socat_fc14.nasl |
2010-09-22 | Name : Mandriva Update for socat MDVSA-2010:183 (socat) File : nvt/gb_mandriva_MDVSA_2010_183.nasl |
2010-09-07 | Name : Fedora Update for socat FEDORA-2010-13403 File : nvt/gb_fedora_2010_13403_socat_fc12.nasl |
2010-09-07 | Name : Fedora Update for socat FEDORA-2010-13412 File : nvt/gb_fedora_2010_13412_socat_fc13.nasl |
2010-08-21 | Name : Debian Security Advisory DSA 2090-1 (socat) File : nvt/deb_2090_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66813 | socat nestlex.c nestlex() Function Local Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL14919.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_socat-120611.nasl - Type : ACT_GATHER_INFO |
2012-07-03 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_socat-8186.nasl - Type : ACT_GATHER_INFO |
2011-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-0098.nasl - Type : ACT_GATHER_INFO |
2010-09-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-13403.nasl - Type : ACT_GATHER_INFO |
2010-09-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-13412.nasl - Type : ACT_GATHER_INFO |
2010-08-09 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2090.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:29:36 |
|