CVE-2010-2799

critical

Description

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.

References

https://github.com/msmania/poodim/commit/6340d5d2c81e55e61522c4b40a6cdd5c39738cc6

https://bugzilla.redhat.com/show_bug.cgi?id=620426

http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch

http://www.dest-unreach.org/socat/contrib/socat-secadv2.html

http://www.debian.org/security/2010/dsa-2090

http://bugs.gentoo.org/show_bug.cgi?id=330785

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=591443

Details

Source: Mitre, NVD

Published: 2010-09-14

Updated: 2025-04-11

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.01422