Lucene search

K
cveRedhatCVE-2014-0019
HistoryFeb 04, 2014 - 9:55 p.m.

CVE-2014-0019

2014-02-0421:55:05
CWE-119
redhat
web.nvd.nist.gov
33
cve
2014
buffer overflow
socat
denial of service
segmentation fault
nvd

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.4

Confidence

High

EPSS

0

Percentile

5.1%

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.

Affected configurations

Nvd
Node
dest-unreachsocatMatch2.0.0b1
OR
dest-unreachsocatMatch2.0.0b2
OR
dest-unreachsocatMatch2.0.0b3
OR
dest-unreachsocatMatch2.0.0b4
OR
dest-unreachsocatMatch2.0.0b5
OR
dest-unreachsocatMatch2.0.0b6
Node
fedoraprojectfedoraMatch19
OR
fedoraprojectfedoraMatch20
Node
opensuseopensuseMatch13.1
Node
dest-unreachsocatMatch1.3.0.0
OR
dest-unreachsocatMatch1.3.0.1
OR
dest-unreachsocatMatch1.3.1.0
OR
dest-unreachsocatMatch1.3.2.0
OR
dest-unreachsocatMatch1.3.2.1
OR
dest-unreachsocatMatch1.3.2.2
OR
dest-unreachsocatMatch1.4.0.0
OR
dest-unreachsocatMatch1.4.0.1
OR
dest-unreachsocatMatch1.4.0.2
OR
dest-unreachsocatMatch1.4.0.3
OR
dest-unreachsocatMatch1.4.1.0
OR
dest-unreachsocatMatch1.4.2.0
OR
dest-unreachsocatMatch1.4.3.0
OR
dest-unreachsocatMatch1.4.3.1
OR
dest-unreachsocatMatch1.5.0.0
OR
dest-unreachsocatMatch1.6.0.0
OR
dest-unreachsocatMatch1.6.0.1
OR
dest-unreachsocatMatch1.7.0.0
OR
dest-unreachsocatMatch1.7.0.1
OR
dest-unreachsocatMatch1.7.1.0
OR
dest-unreachsocatMatch1.7.1.1
OR
dest-unreachsocatMatch1.7.1.2
OR
dest-unreachsocatMatch1.7.1.3
OR
dest-unreachsocatMatch1.7.2.0
OR
dest-unreachsocatMatch1.7.2.1
OR
dest-unreachsocatMatch1.7.2.2
VendorProductVersionCPE
dest-unreachsocat2.0.0cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*
dest-unreachsocat2.0.0cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*
dest-unreachsocat2.0.0cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*
dest-unreachsocat2.0.0cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*
dest-unreachsocat2.0.0cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*
dest-unreachsocat2.0.0cpe:2.3:a:dest-unreach:socat:2.0.0:b6:*:*:*:*:*:*
fedoraprojectfedora19cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
fedoraprojectfedora20cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
opensuseopensuse13.1cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
dest-unreachsocat1.3.0.0cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 351

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.4

Confidence

High

EPSS

0

Percentile

5.1%