Download
| Alert*
oval:org.secpod.oval:def:89045142
This update for socat fixes the following issues: - CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode - CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow - Fix a stack overflow in ... oval:org.secpod.oval:def:106415 Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device , a socket , an SSL socket, proxy CONNECT connection, a file descriptor , the GNU line editor , a program, or a combination of two of these. oval:org.secpod.oval:def:106378 Socat is a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device , a socket , an SSL socket, proxy CONNECT connection, a file descriptor , the GNU line editor , a program, or a combination of two of these. The compat-read ... oval:org.secpod.oval:def:1600046 Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service via a long server name in the PROXY-CONNECT address in the command line. |