oss-sec mailing list archives
socat security advisory
From: Gerhard Rieger <gerhard () dest-unreach org>
Date: Mon, 14 May 2012 16:50:25 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Socat security advisory 3
Overview
A heap based buffer overflow vulnerability has been found with data
that happens to be output on the READLINE address. Successful
exploitation may allow an attacker to execute arbitrary code with
the privileges of the socat process.
Vulnerability Id: CVE-2012-0219
Details
This vulnerability can be exploited when socat is invoked with the
READLINE address (this is usually only used interactively) without
option "prompt" and without option "noprompt" and an attacker
succeeds to provide malicious data to the other (arbitrary) address
that is then transferred by socat to the READLINE address for
output.
The problem was caused by a coding error in function
xioscan_readline().
Testcase
To check your socat program do the following:
perl -e 'print "\r"."A"x 513' >/tmp/socat-data
socat readline exec:'cat /tmp/socat-data'
When socat crashes with a signal (e.g. SIGSEGV) and does not output
any 'A' it is vulnerable.
Workaround
Use option "prompt" or option "noprompt" with the READLINE address.
Affected versions
1.4.0.0 - 1.7.2.0
2.0.0-b1 - 2.0.0-b4
Not affected or corrected versions
1.0.0.0 - 1.3.2.2
1.7.2.1 and later
2.0.0-b5 and later
Download
The updated sources can be downloaded from:
http://www.dest-unreach.org/socat/download/socat-1.7.2.1.tar.gz
http://www.dest-unreach.org/socat/download/socat-2.0.0-b5.tar.gz
Patch to 1.7.2.0:
http://www.dest-unreach.org/socat/download/socat-1.7.2.1.patch.gz
Patch to 2.0.0-b4:
http://www.dest-unreach.org/socat/download/socat-2.0.0-b5.patch.gz
History
2012/04/22 vulnerability report received
2012/04/22 fix to 1.7.2.0 generated
2012/04/27 fix to 2.0.0-b4 generated
2012/05/14 fixes published
Credits
Full credits to Johan Thillemann for finding and reporting this issue.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQEcBAEBAgAGBQJPsRulAAoJEBszgb37UeYgi0wH/0xEApMf2oEk93GQWcG3abnl
PadXWh0Z1MnsmBMEYQR+dwqy+SveCBuJvn7sztGTLLKmcd2IoXXqF5lpLUT5lfcf
HLjYrwBuPgqOJg21lqXZ0p5jLOhitqtX66mr+KiOZ11lkcXZDorv/Mpsf+0g2oYY
7foPTLud41rmhKQAA2haLLwYWb7qTrh1GF49HVpumFv9Sq+qrHkGNiuK9MMv7kqq
t+MoTTxWYhmaR7uOyhEpS+nISHWPlGhSmypnxWuOFWctgu3YuT0SE4mdRv2qJNyk
akm3s+Sn4OWtc0GMYtKgXIFZWLAEyFVykKnWMRclzEamsFBe/gXHUOeyGJDbsU8=
=L+w3
-----END PGP SIGNATURE-----
Current thread:
- socat security advisory Gerhard Rieger (May 14)
