1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
|
Candidate: CVE-2010-2799
PublicDate: 2010-09-14
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2799
Description:
Stack-based buffer overflow in the nestlex function in nestlex.c in Socat
1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional
data relay is enabled, allows context-dependent attackers to execute
arbitrary code via long command-line arguments.
Ubuntu-Description:
Notes:
Bugs:
https://bugs.launchpad.net/bugs/1020166
Priority: medium
Discovered-by:
Assigned-to:
Patches_socat:
upstream_socat: released (1.7.1.3-1)
dapper_socat: ignored (reached end-of-life)
hardy_socat: ignored (reached end-of-life)
jaunty_socat: released (1.6.0.1-1+lenny1build0.9.04.1)
karmic_socat: ignored (reached end-of-life)
lucid_socat: ignored (reached end-of-life)
maverick_socat: not-affected (1.7.1.3-1)
natty_socat: not-affected (1.7.1.3-1)
oneiric_socat: not-affected (1.7.1.3-1)
precise_socat: not-affected (1.7.1.3-1)
quantal_socat: not-affected (1.7.1.3-1)
raring_socat: not-affected (1.7.1.3-1)
saucy_socat: not-affected (1.7.1.3-1)
devel_socat: not-affected (1.7.1.3-1)
|