diff options
author | zi <zi@FreeBSD.org> | 2012-05-15 05:18:00 +0800 |
---|---|---|
committer | zi <zi@FreeBSD.org> | 2012-05-15 05:18:00 +0800 |
commit | eda8867f0365b33201bc906907a65126aff18d41 (patch) | |
tree | d10ce425fb5f2f203174dac7b344cf6874808440 /security | |
parent | 86e087ece1eaa6eac92f5c72367552eaf6db7d7e (diff) | |
download | freebsd-ports-gnome-eda8867f0365b33201bc906907a65126aff18d41.tar.gz freebsd-ports-gnome-eda8867f0365b33201bc906907a65126aff18d41.tar.zst freebsd-ports-gnome-eda8867f0365b33201bc906907a65126aff18d41.zip |
- Document vulnerability in net/socat (CVE-2012-0219)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a512edc5241e..12272b8dea57 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -52,6 +52,38 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="6601127c-9e09-11e1-b5e0-000c299b62e1"> + <topic>socat -- Heap-based buffer overflow</topic> + <affects> + <package> + <name>socat</name> + <range><lt>1.7.2.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The socat development team reports:</p> + <blockquote cite="http://www.dest-unreach.org/socat/contrib/socat-secadv3.html"> + <p>This vulnerability can be exploited when socat is invoked with the + READLINE address (this is usually only used interactively) without + option "prompt" and without option "noprompt" and an attacker succeeds + to provide malicious data to the other (arbitrary) address that is then + transferred by socat to the READLINE address for output.</p> + <p>Successful exploitation may allow an attacker to execute arbitrary + code with the privileges of the socat process.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-0219</cvename> + <url>www.dest-unreach.org/socat/contrib/socat-secadv3.html</url> + </references> + <dates> + <discovery>2012-05-14</discovery> + <entry>2012-05-14</entry> + </dates> + </vuln> + <vuln vid="59b68b1e-9c78-11e1-b5e0-000c299b62e1"> <topic>php -- multiple vulnerabilities</topic> <affects> |