oss-sec mailing list archives
Socat security advisory 8 - Stack overflow in parser
From: Gerhard Rieger <gerhard () dest-unreach org>
Date: Mon, 1 Feb 2016 16:35:02 +0100
Socat security advisory 8 - Stack overflow in parser
Overview
A stack overflow vulnerability was found that can be triggered when
command line arguments (complete address specifications, host names,
file names) are longer than 512 bytes.
Successful exploitation might allow an attacker to execute arbitrary code
with the privileges of the socat process.
This vulnerability can only be exploited when an attacker is able to
inject data into socat's command line.
A vulnerable scenario would be a CGI script that reads data from
clients and uses (parts of) this data as hostname for a Socat
invocation.
Vulnerability Ids
Socat security issue 8
Severity: Low
Affected versions
1.5.0.0 - 1.7.3.0
2.0.0-b1 - 2.0.0-b8
Not affected or corrected versions
1.0.0.0 - 1.4.3.1
1.7.3.1 and later
2.0.0-b9 and later
Workaround
Do not pass unfiltered data from untrusted sources to socat's command line
Download
The updated sources can be downloaded from:
http://www.dest-unreach.org/socat/download/socat-1.7.3.1.tar.gz
http://www.dest-unreach.org/socat/download/socat-2.0.0-b9.tar gz
Acknowledgement
Takume Akiyma found and reported this issue.
Attachment:
signature.asc
Description: OpenPGP digital signature
Current thread:
- Socat security advisory 8 - Stack overflow in parser Gerhard Rieger (Feb 01)
- Re: Socat security advisory 8 - Stack overflow in parser cve-assign (Feb 02)
