Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/49746 | third-party-advisory x_refsource_SECUNIA |
| http://www.securitytracker.com/id?1027064 | vdb-entry x_refsource_SECTRACK |
| http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081882.html | vendor-advisory x_refsource_FEDORA |
| http://security.gentoo.org/glsa/glsa-201208-01.xml | vendor-advisory x_refsource_GENTOO |
| http://www.dest-unreach.org/socat/contrib/socat-secadv3.html | x_refsource_CONFIRM |
| http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081619.html | vendor-advisory x_refsource_FEDORA |
| http://www.lwn.net/Articles/504742/ | vendor-advisory x_refsource_SUSE |
| http://www.securityfocus.com/bid/53510 | vdb-entry x_refsource_BID |
| http://www.mandriva.com/security/advisories?name=MDVSA-2013:169 | vendor-advisory x_refsource_MANDRIVA |
| http://www.osvdb.org/81969 | vdb-entry x_refsource_OSVDB |
| http://secunia.com/advisories/49105 | third-party-advisory x_refsource_SECUNIA |
| http://www.openwall.com/lists/oss-security/2012/05/14/2 | mailing-list x_refsource_MLIST |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|