paul Posted September 15, 2010 Report Share Posted September 15, 2010 A vulnerability has been found and corrected in socat: Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments (CVE-2010-2799). The updated packages have been patched to correct this issue. Link to comment Share on other sites More sharing options...
Recommended Posts