Socat远程格式字符串漏洞

漏洞信息详情

Socat远程格式字符串漏洞

漏洞简介

socat 1.4.0.3版本及之前版本的error.c中的_msg函数在被用作HTTP代理客户端并且带-ly运行时,存在格式字符串漏洞。远程攻击者或本地用户可以借助系统记录消息中的格式字符串说明符执行任意代码。

漏洞公告

The vendor has released a new version of the package to address this issue:
Gentoo has released an advisory (GLSA 200410-26) to address this issue. Please see the referenced advisory for more information. Gentoo users may carry out the following actions to update their computers:
emerge –sync
emerge –ask –oneshot –verbose “>=net-misc/socat-1.4.0.3”
socat socat 1.0 .x

socat socat 1.1 .x

socat socat 1.2 .x

socat socat 1.3 .x

socat socat 1.4 .0.0

socat socat 1.4 .0.1

socat socat 1.4 .0.2

参考网址

来源: XF
名称: socat-format-string(17822)
链接:http://xforce.iss.net/xforce/xfdb/17822

来源: BID
名称: 11505
链接:http://www.securityfocus.com/bid/11505

来源: www.nosystem.com.ar
链接:http://www.nosystem.com.ar/advisories/advisory-07.txt

来源: GENTOO
名称: GLSA-200410-26
链接:http://www.gentoo.org/security/en/glsa/glsa-200410-26.xml

来源: SECUNIA
名称: 12936
链接:http://secunia.com/advisories/12936/

来源: www.dest-unreach.org
链接:http://www.dest-unreach.org/socat/advisory/socat-adv-1.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享