Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2010-09-14 14:00
Updated : 2010-09-14 21:00
NVD link : CVE-2010-2799
Mitre link : CVE-2010-2799
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
dest-unreach
- socat