Jump to content

Advisories MDVSA-2010:183: socat


paul
 Share

Recommended Posts

A vulnerability has been found and corrected in socat:

 

Stack-based buffer overflow in the nestlex function in nestlex.c

in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3,

when bidirectional data relay is enabled, allows context-dependent

attackers to execute arbitrary code via long command-line arguments

(CVE-2010-2799).

 

The updated packages have been patched to correct this issue.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...