Mandriva Linux Security Advisory : socat (MDVSA-2014:033)

low Nessus Plugin ID 72531

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

A vulnerability has been discovered and corrected in socat :

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line (CVE-2014-0019).

The updated packages have been upgraded to the 1.7.2.3 version which is not vulnerable to this issue.

Solution

Update the affected socat package.

See Also

http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt

Plugin Details

Severity: Low

ID: 72531

File Name: mandriva_MDVSA-2014-033.nasl

Version: 1.6

Type: local

Published: 2/17/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 1.9

Temporal Score: 1.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:socat, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/14/2014

Reference Information

CVE: CVE-2014-0019

BID: 65201

MDVSA: 2014:033