From 1dc076f3b5f89c901de00063a55ebcf0b5cb3862 Mon Sep 17 00:00:00 2001 From: Ryan Steinmetz Date: Mon, 14 May 2012 21:18:00 +0000 Subject: - Document vulnerability in net/socat (CVE-2012-0219) --- security/vuxml/vuln.xml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) (limited to 'security/vuxml/vuln.xml') diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a512edc5241e..12272b8dea57 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -52,6 +52,38 @@ Note: Please add new entries to the beginning of this file. --> + + socat -- Heap-based buffer overflow + + + socat + 1.7.2.1 + + + + +

The socat development team reports:

+
+

This vulnerability can be exploited when socat is invoked with the + READLINE address (this is usually only used interactively) without + option "prompt" and without option "noprompt" and an attacker succeeds + to provide malicious data to the other (arbitrary) address that is then + transferred by socat to the READLINE address for output.

+

Successful exploitation may allow an attacker to execute arbitrary + code with the privileges of the socat process.

+
+ +
+ + CVE-2012-0219 + www.dest-unreach.org/socat/contrib/socat-secadv3.html + + + 2012-05-14 + 2012-05-14 + +
+ php -- multiple vulnerabilities -- cgit v1.2.3