Vulnerabilities > Dest Unreach > Socat > 1.7.0.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-06-08 | CVE-2015-1379 | Improper Input Validation vulnerability in Dest-Unreach Socat The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash). | 5.0 |
2014-05-08 | CVE-2013-3571 | Remote Denial of Service vulnerability in socat socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions. | 2.6 |
2014-02-04 | CVE-2014-0019 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line. | 1.9 |
2012-06-21 | CVE-2012-0219 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Dest-Unreach Socat Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address. | 6.2 |
2010-09-14 | CVE-2010-2799 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Dest-Unreach Socat Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments. | 6.8 |