ID OPENVAS:867494 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2017-07-10T00:00:00
Description
Check for the Version of socat
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for socat FEDORA-2014-1811
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
if(description)
{
script_id(867494);
script_version("$Revision: 6629 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $");
script_tag(name:"creation_date", value:"2014-02-13 11:40:48 +0530 (Thu, 13 Feb 2014)");
script_cve_id("CVE-2014-0019");
script_tag(name:"cvss_base", value:"1.9");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:N/I:N/A:P");
script_name("Fedora Update for socat FEDORA-2014-1811");
tag_insight = "Socat is a relay for bidirectional data transfer between two independent data
channels. Each of these data channels may be a file, pipe, device (serial line
etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an
SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU
line editor (readline), a program, or a combination of two of these.
";
tag_affected = "socat on Fedora 20";
tag_solution = "Please Install the Updated Packages.";
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name: "FEDORA", value: "2014-1811");
script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html");
script_summary("Check for the Version of socat");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "FC20")
{
if ((res = isrpmvuln(pkg:"socat", rpm:"socat~1.7.2.3~1.fc20", rls:"FC20")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:867494", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for socat FEDORA-2014-1811", "description": "Check for the Version of socat", "published": "2014-02-13T00:00:00", "modified": "2017-07-10T00:00:00", "cvss": {"score": 1.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "http://plugins.openvas.org/nasl.php?oid=867494", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html", "2014-1811"], "cvelist": ["CVE-2014-0019"], "lastseen": "2017-07-25T10:48:32", "viewCount": 0, "enchantments": {"score": {"value": 5.6, "vector": "NONE", "modified": "2017-07-25T10:48:32", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2014-0019", "CVE-2014-1811"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310867494", "OPENVAS:867503", "OPENVAS:1361412562310867503", "OPENVAS:1361412562310120521"]}, {"type": "freebsd", "idList": ["A4C9E12D-88B7-11E3-8ADA-10BF48E1088E"]}, {"type": "nessus", "idList": ["FEDORA_2014-1811.NASL", "OPENSUSE-2015-324.NASL", "FEDORA_2014-1795.NASL", "MANDRIVA_MDVSA-2014-033.NASL", "FREEBSD_PKG_A4C9E12D88B711E38ADA10BF48E1088E.NASL", "ALA_ALAS-2014-300.NASL"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:13574", "SECURITYVULNS:DOC:30318"]}, {"type": "seebug", "idList": ["SSV:61420"]}, {"type": "fedora", "idList": ["FEDORA:D587822838", "FEDORA:65E2421D12"]}, {"type": "amazon", "idList": ["ALAS-2014-300"]}], "modified": "2017-07-25T10:48:32", "rev": 2}, "vulnersScore": 5.6}, "pluginID": "867494", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for socat FEDORA-2014-1811\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867494);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-13 11:40:48 +0530 (Thu, 13 Feb 2014)\");\n script_cve_id(\"CVE-2014-0019\");\n script_tag(name:\"cvss_base\", value:\"1.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for socat FEDORA-2014-1811\");\n\n tag_insight = \"Socat is a relay for bidirectional data transfer between two independent data\nchannels. Each of these data channels may be a file, pipe, device (serial line\netc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an\nSSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU\nline editor (readline), a program, or a combination of two of these.\n\";\n\n tag_affected = \"socat on Fedora 20\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-1811\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html\");\n script_summary(\"Check for the Version of socat\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"socat\", rpm:\"socat~1.7.2.3~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "naslFamily": "Fedora Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T06:14:24", "description": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.", "edition": 4, "cvss3": {}, "published": "2014-02-04T21:55:00", "title": "CVE-2014-0019", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 1.9, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2014-0019"], "modified": "2018-10-30T16:27:00", "cpe": ["cpe:/a:dest-unreach:socat:1.7.2.0", "cpe:/a:dest-unreach:socat:1.3.0.1", "cpe:/a:dest-unreach:socat:1.4.3.0", "cpe:/a:dest-unreach:socat:1.3.2.0", "cpe:/a:dest-unreach:socat:1.6.0.1", "cpe:/a:dest-unreach:socat:1.4.0.3", "cpe:/a:dest-unreach:socat:1.3.2.1", "cpe:/a:dest-unreach:socat:1.4.3.1", "cpe:/o:fedoraproject:fedora:19", "cpe:/o:opensuse:opensuse:13.1", "cpe:/a:dest-unreach:socat:1.7.0.1", "cpe:/a:dest-unreach:socat:1.4.0.1", "cpe:/a:dest-unreach:socat:1.4.0.2", "cpe:/a:dest-unreach:socat:1.7.1.3", "cpe:/a:dest-unreach:socat:1.7.1.0", "cpe:/a:dest-unreach:socat:1.7.0.0", "cpe:/a:dest-unreach:socat:1.4.1.0", "cpe:/a:dest-unreach:socat:1.4.2.0", "cpe:/a:dest-unreach:socat:1.3.0.0", "cpe:/o:fedoraproject:fedora:20", "cpe:/a:dest-unreach:socat:1.4.0.0", "cpe:/a:dest-unreach:socat:1.7.1.1", "cpe:/a:dest-unreach:socat:1.7.2.1", "cpe:/a:dest-unreach:socat:1.7.1.2", "cpe:/a:dest-unreach:socat:1.6.0.0", "cpe:/a:dest-unreach:socat:1.7.2.2", "cpe:/a:dest-unreach:socat:1.5.0.0", "cpe:/a:dest-unreach:socat:1.3.2.2", "cpe:/a:dest-unreach:socat:1.3.1.0", "cpe:/a:dest-unreach:socat:2.0.0"], "id": "CVE-2014-0019", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0019", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:2.0.0:b2:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:2.0.0:b1:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:2.0.0:b5:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:2.0.0:b3:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:2.0.0:b6:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:2.0.0:b4:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:dest-unreach:socat:1.3.0.1:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-25T10:49:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "description": "Check for the Version of socat", "modified": "2017-07-10T00:00:00", "published": "2014-02-13T00:00:00", "id": "OPENVAS:867503", "href": "http://plugins.openvas.org/nasl.php?oid=867503", "type": "openvas", "title": "Fedora Update for socat FEDORA-2014-1795", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for socat FEDORA-2014-1795\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867503);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-13 11:41:09 +0530 (Thu, 13 Feb 2014)\");\n script_cve_id(\"CVE-2014-0019\");\n script_tag(name:\"cvss_base\", value:\"1.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for socat FEDORA-2014-1795\");\n\n tag_insight = \"Socat is a relay for bidirectional data transfer between two independent data\nchannels. Each of these data channels may be a file, pipe, device (serial line\netc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an\nSSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU\nline editor (readline), a program, or a combination of two of these.\nThe compat-readline5 library is used to avoid GPLv2 vs GPLv3 issues.\n\";\n\n tag_affected = \"socat on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-1795\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html\");\n script_summary(\"Check for the Version of socat\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"socat\", rpm:\"socat~1.7.2.3~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 1.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2020-03-17T23:00:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120521", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120521", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-300)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120521\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:28:28 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-300)\");\n script_tag(name:\"insight\", value:\"Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.\");\n script_tag(name:\"solution\", value:\"Run yum update socat to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-300.html\");\n script_cve_id(\"CVE-2014-0019\");\n script_tag(name:\"cvss_base\", value:\"1.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"socat\", rpm:\"socat~1.7.2.3~1.10.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"socat-debuginfo\", rpm:\"socat-debuginfo~1.7.2.3~1.10.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:37:23", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-02-13T00:00:00", "id": "OPENVAS:1361412562310867503", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867503", "type": "openvas", "title": "Fedora Update for socat FEDORA-2014-1795", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for socat FEDORA-2014-1795\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867503\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-13 11:41:09 +0530 (Thu, 13 Feb 2014)\");\n script_cve_id(\"CVE-2014-0019\");\n script_tag(name:\"cvss_base\", value:\"1.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for socat FEDORA-2014-1795\");\n script_tag(name:\"affected\", value:\"socat on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-1795\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'socat'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"socat\", rpm:\"socat~1.7.2.3~1.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:37:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-02-13T00:00:00", "id": "OPENVAS:1361412562310867494", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867494", "type": "openvas", "title": "Fedora Update for socat FEDORA-2014-1811", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for socat FEDORA-2014-1811\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867494\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-02-13 11:40:48 +0530 (Thu, 13 Feb 2014)\");\n script_cve_id(\"CVE-2014-0019\");\n script_tag(name:\"cvss_base\", value:\"1.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_name(\"Fedora Update for socat FEDORA-2014-1811\");\n script_tag(name:\"affected\", value:\"socat on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-1811\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'socat'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"socat\", rpm:\"socat~1.7.2.3~1.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}], "amazon": [{"lastseen": "2020-11-10T12:36:10", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0019"], "description": "**Issue Overview:**\n\nStack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.\n\n \n**Affected Packages:** \n\n\nsocat\n\n \n**Issue Correction:** \nRun _yum update socat_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n socat-1.7.2.3-1.10.amzn1.i686 \n socat-debuginfo-1.7.2.3-1.10.amzn1.i686 \n \n src: \n socat-1.7.2.3-1.10.amzn1.src \n \n x86_64: \n socat-debuginfo-1.7.2.3-1.10.amzn1.x86_64 \n socat-1.7.2.3-1.10.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-03-06T14:57:00", "published": "2014-03-06T14:57:00", "id": "ALAS-2014-300", "href": "https://alas.aws.amazon.com/ALAS-2014-300.html", "title": "Low: socat", "type": "amazon", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2021-01-07T11:54:31", "description": "A vulnerability has been discovered and corrected in socat :\n\nStack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and\n2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of\nservice (segmentation fault) via a long server name in the\nPROXY-CONNECT address in the command line (CVE-2014-0019).\n\nThe updated packages have been upgraded to the 1.7.2.3 version which\nis not vulnerable to this issue.", "edition": 25, "published": "2014-02-17T00:00:00", "title": "Mandriva Linux Security Advisory : socat (MDVSA-2014:033)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "modified": "2014-02-17T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:socat"], "id": "MANDRIVA_MDVSA-2014-033.NASL", "href": "https://www.tenable.com/plugins/nessus/72531", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2014:033. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72531);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-0019\");\n script_bugtraq_id(65201);\n script_xref(name:\"MDVSA\", value:\"2014:033\");\n\n script_name(english:\"Mandriva Linux Security Advisory : socat (MDVSA-2014:033)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandriva Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been discovered and corrected in socat :\n\nStack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and\n2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of\nservice (segmentation fault) via a long server name in the\nPROXY-CONNECT address in the command line (CVE-2014-0019).\n\nThe updated packages have been upgraded to the 1.7.2.3 version which\nis not vulnerable to this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected socat package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:socat\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/02/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"socat-1.7.2.3-1.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:12:29", "description": "Security update for CVE-2014-0019, which fixes a denial of service\nflaw in socat when using PROXY-CONNECT\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-02-13T00:00:00", "title": "Fedora 20 : socat-1.7.2.3-1.fc20 (2014-1811)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "modified": "2014-02-13T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:20", "p-cpe:/a:fedoraproject:fedora:socat"], "id": "FEDORA_2014-1811.NASL", "href": "https://www.tenable.com/plugins/nessus/72463", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-1811.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72463);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-0019\");\n script_bugtraq_id(65201);\n script_xref(name:\"FEDORA\", value:\"2014-1811\");\n\n script_name(english:\"Fedora 20 : socat-1.7.2.3-1.fc20 (2014-1811)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security update for CVE-2014-0019, which fixes a denial of service\nflaw in socat when using PROXY-CONNECT\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1057746\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128190.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d0c010d9\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected socat package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:socat\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"socat-1.7.2.3-1.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"socat\");\n}\n", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-12T10:12:29", "description": "Security update for CVE-2014-0019, which fixes a denial of service\nflaw in socat when using PROXY-CONNECT\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-02-13T00:00:00", "title": "Fedora 19 : socat-1.7.2.3-1.fc19 (2014-1795)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "modified": "2014-02-13T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:19", "p-cpe:/a:fedoraproject:fedora:socat"], "id": "FEDORA_2014-1795.NASL", "href": "https://www.tenable.com/plugins/nessus/72462", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-1795.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72462);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2014-0019\");\n script_bugtraq_id(65201);\n script_xref(name:\"FEDORA\", value:\"2014-1795\");\n\n script_name(english:\"Fedora 19 : socat-1.7.2.3-1.fc19 (2014-1795)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security update for CVE-2014-0019, which fixes a denial of service\nflaw in socat when using PROXY-CONNECT\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1057746\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-February/128229.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e2f2cd80\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected socat package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:socat\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/02/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"socat-1.7.2.3-1.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"socat\");\n}\n", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-20T12:28:29", "description": "socat was updated 1.7.2.4 to fix one security issue and bugs.\n\nThe following vulnerabilities were fixed :\n\n - socats PROXY-CONNECT address was vulnerable to a buffer\n overflow with data from command line (CVE-2014-0019,\n boo#860991)\n\nThe following bugs were fixed :\n\n - socat would frequently crash on ppc and armv7l\n (boo#927161)\n\n - various other bug fixes in 1.7.2.4", "edition": 17, "published": "2015-04-27T00:00:00", "title": "openSUSE Security Update : socat (openSUSE-2015-324)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "modified": "2015-04-27T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:socat-debuginfo", "p-cpe:/a:novell:opensuse:socat", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:socat-debugsource"], "id": "OPENSUSE-2015-324.NASL", "href": "https://www.tenable.com/plugins/nessus/83083", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-324.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(83083);\n script_version(\"2.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-0019\");\n\n script_name(english:\"openSUSE Security Update : socat (openSUSE-2015-324)\");\n script_summary(english:\"Check for the openSUSE-2015-324 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"socat was updated 1.7.2.4 to fix one security issue and bugs.\n\nThe following vulnerabilities were fixed :\n\n - socats PROXY-CONNECT address was vulnerable to a buffer\n overflow with data from command line (CVE-2014-0019,\n boo#860991)\n\nThe following bugs were fixed :\n\n - socat would frequently crash on ppc and armv7l\n (boo#927161)\n\n - various other bug fixes in 1.7.2.4\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=860991\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=927161\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected socat packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:socat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:socat-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:socat-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/04/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/04/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"socat-1.7.2.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"socat-debuginfo-1.7.2.4-2.3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"socat-debugsource-1.7.2.4-2.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"socat / socat-debuginfo / socat-debugsource\");\n}\n", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-02-01T01:20:39", "description": "Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and\n2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of\nservice (segmentation fault) via a long server name in the\nPROXY-CONNECT address in the command line.", "edition": 24, "published": "2014-03-12T00:00:00", "title": "Amazon Linux AMI : socat (ALAS-2014-300)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "modified": "2021-02-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:socat-debuginfo", "p-cpe:/a:amazon:linux:socat", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2014-300.NASL", "href": "https://www.tenable.com/plugins/nessus/72948", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-300.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(72948);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2014-0019\");\n script_xref(name:\"ALAS\", value:\"2014-300\");\n\n script_name(english:\"Amazon Linux AMI : socat (ALAS-2014-300)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and\n2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of\nservice (segmentation fault) via a long server name in the\nPROXY-CONNECT address in the command line.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-300.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update socat' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:socat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:socat-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/03/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/03/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"socat-1.7.2.3-1.10.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"socat-debuginfo-1.7.2.3-1.10.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"socat / socat-debuginfo\");\n}\n", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-01-07T10:48:46", "description": "Florian Weimer of the Red Hat Product Security Team reports :\n\nDue to a missing check during assembly of the HTTP request line a long\ntarget server name in the PROXY-CONNECT address can cause a stack\nbuffer overrun. Exploitation requires that the attacker is able to\nprovide the target server name to the PROXY-CONNECT address in the\ncommand line. This can happen for example in scripts that receive data\nfrom untrusted sources.", "edition": 21, "published": "2014-01-30T00:00:00", "title": "FreeBSD : socat -- buffer overflow with data from command line (a4c9e12d-88b7-11e3-8ada-10bf48e1088e)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0019"], "modified": "2014-01-30T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:socat", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_A4C9E12D88B711E38ADA10BF48E1088E.NASL", "href": "https://www.tenable.com/plugins/nessus/72206", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(72206);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2014-0019\");\n\n script_name(english:\"FreeBSD : socat -- buffer overflow with data from command line (a4c9e12d-88b7-11e3-8ada-10bf48e1088e)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Florian Weimer of the Red Hat Product Security Team reports :\n\nDue to a missing check during assembly of the HTTP request line a long\ntarget server name in the PROXY-CONNECT address can cause a stack\nbuffer overrun. Exploitation requires that the attacker is able to\nprovide the target server name to the PROXY-CONNECT address in the\ncommand line. This can happen for example in scripts that receive data\nfrom untrusted sources.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt\"\n );\n # https://vuxml.freebsd.org/freebsd/a4c9e12d-88b7-11e3-8ada-10bf48e1088e.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c505e35b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:socat\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2014/01/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/01/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/01/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"socat<1.7.2.3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:pkg_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:30", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0019"], "description": "\nFlorian Weimer of the Red Hat Product Security Team reports:\n\nDue to a missing check during assembly of the HTTP request line a long\n\t target server name in the PROXY-CONNECT address can cause a stack buffer\n\t overrun. Exploitation requires that the attacker is able to provide the\n\t target server name to the PROXY-CONNECT address in the command line.\n\t This can happen for example in scripts that receive data from untrusted\n\t sources.\n\n", "edition": 4, "modified": "2014-01-24T00:00:00", "published": "2014-01-24T00:00:00", "id": "A4C9E12D-88B7-11E3-8ADA-10BF48E1088E", "href": "https://vuxml.freebsd.org/freebsd/a4c9e12d-88b7-11e3-8ada-10bf48e1088e.html", "title": "socat -- buffer overflow with data from command line", "type": "freebsd", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:50", "bulletinFamily": "software", "cvelist": ["CVE-2014-0019"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2014:033\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : socat\r\n Date : February 14, 2014\r\n Affected: Business Server 1.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n A vulnerability has been discovered and corrected in socat:\r\n \r\n Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and\r\n 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial\r\n of service (segmentation fault) via a long server name in the\r\n PROXY-CONNECT address in the command line (CVE-2014-0019).\r\n \r\n The updated packages have been upgraded to the 1.7.2.3 version which\r\n is not vulnerable to this issue.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0019\r\n http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Business Server 1/X86_64:\r\n 556abad28fdb5cc80a15ff69790f4487 mbs1/x86_64/socat-1.7.2.3-1.mbs1.x86_64.rpm \r\n 4174e565e7144f2e37712c97163e8292 mbs1/SRPMS/socat-1.7.2.3-1.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFS/hAYmqjQ0CJFipgRAhMEAKDMEcdwHBt5zIul+3JpAHc0hxIJFwCfaunk\r\nncmqVSK6cQLcTIN5dFoju5Q=\r\n=BAB9\r\n-----END PGP SIGNATURE-----\r\n", "edition": 1, "modified": "2014-02-18T00:00:00", "published": "2014-02-18T00:00:00", "id": "SECURITYVULNS:DOC:30318", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30318", "title": "[ MDVSA-2014:033 ] socat", "type": "securityvulns", "cvss": {"score": 1.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:54", "bulletinFamily": "software", "cvelist": ["CVE-2014-0019"], "description": "Buffer overflow on command line arguments parsing.", "edition": 1, "modified": "2014-02-18T00:00:00", "published": "2014-02-18T00:00:00", "id": "SECURITYVULNS:VULN:13574", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13574", "title": "socat buffer overflow", "type": "securityvulns", "cvss": {"score": 1.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "seebug": [{"lastseen": "2017-11-19T17:34:25", "description": "BUGTRAQ ID: 65201\r\nCVE(CAN) ID: CVE-2014-0019\r\n\r\nSocat\u662f\u4e00\u4e2a\u57fa\u4e8e\u547d\u4ee4\u884c\u7684\u5de5\u5177\uff0c\u53ef\u4ee5\u521b\u5efa\u4e24\u4e2a\u53cc\u5411\u5b57\u8282\u6d41\u5e76\u5728\u5176\u95f4\u4f20\u8f93\u6570\u636e\u3002\r\n\r\nsocat 1.3.0.0-1.7.2.2\u30012.0.0-b1-2.0.0-b6\u5b58\u5728\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u672c\u5730\u7528\u6237\u901a\u8fc7\u547d\u4ee4\u884c\u5185PROXY-CONNECT\u5730\u5740\u4e2d\u7684\u8d85\u957f\u670d\u52a1\u5668\u540d\u79f0\uff0c\u5373\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u53d7\u5f71\u54cd\u5e94\u7528\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\n0\nsocat socat 2.0.0-b1 - 2.0.0-b6\r\nsocat socat 1.3.0.0 - 1.7.2.2\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nsocat\r\n-----\r\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\n\r\nhttp://www.dest-unreach.org/socat/", "published": "2014-02-12T00:00:00", "type": "seebug", "title": "socat PROXY-CONNECT\u5730\u5740\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e", "bulletinFamily": "exploit", "cvelist": ["CVE-2014-0019"], "modified": "2014-02-12T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-61420", "id": "SSV:61420", "sourceData": "", "sourceHref": "", "cvss": {"score": 1.9, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0019"], "description": "Socat is a relay for bidirectional data transfer between two independent da ta channels. Each of these data channels may be a file, pipe, device (serial l ine etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the G NU line editor (readline), a program, or a combination of two of these. The compat-readline5 library is used to avoid GPLv2 vs GPLv3 issues. ", "modified": "2014-02-12T14:52:39", "published": "2014-02-12T14:52:39", "id": "FEDORA:D587822838", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: socat-1.7.2.3-1.fc19", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0019"], "description": "Socat is a relay for bidirectional data transfer between two independent da ta channels. Each of these data channels may be a file, pipe, device (serial l ine etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the G NU line editor (readline), a program, or a combination of two of these. ", "modified": "2014-02-12T14:38:55", "published": "2014-02-12T14:38:55", "id": "FEDORA:65E2421D12", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: socat-1.7.2.3-1.fc20", "cvss": {"score": 1.9, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:P"}}]}