Vulnerability CVE-2014-0019


Published: 2014-02-04   Modified: 2014-02-05

Description:
Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:L/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.9/10
2.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Opensuse -> Opensuse 
Novell -> Opensuse 
Fedoraproject -> Fedora 
Dest-unreach -> Socat 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html
http://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html
http://seclists.org/oss-sec/2014/q1/159
http://www.dest-unreach.org/socat
http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt
http://www.mandriva.com/security/advisories?name=MDVSA-2014:033
http://www.securityfocus.com/bid/65201

Copyright 2024, cxsecurity.com

 

Back to Top