Date: Mon, 2 Aug 2010 16:02:40 -0400 (EDT) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE Request -- Socat -- Stack overflow by lexical scanning of nested character patterns Please use CVE-2010-2799 Thanks. -- JB ----- "Jan Lieskovsky" <jlieskov@...hat.com> wrote: > Hi Steve, vendors, > > Socat upstream, released an advisory: >  http://www.dest-unreach.org/socat/contrib/socat-secadv2.html > > describing a stack overflow flaw, present in Socat bidirectional data > relay, when > processing command line arguments (address specifications, host names, > file names), > longer than 512 bytes. An attacker, able to to inject data into > sockat's command line > (potentially remotely via CGI script invocation), could use this flaw > to execute > arbitrary code with the privileges of the socat process. > > References: >  http://bugs.gentoo.org/show_bug.cgi?id=330785 > > Upstream patch against v1.7.2: >  http://www.dest-unreach.org/socat/download/socat-188.8.131.52.patch > > Credit: > Issue discovered and reported by Felix Gröbert of Google Security > Team > > Could you allocate a CVE id for this? > > Thanks && Regards, Jan. > -- > Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.