Mandriva Linux Security Advisory : socat (MDVSA-2014:033)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing a security update.

Description :

A vulnerability has been discovered and corrected in socat :

Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and
2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of
service (segmentation fault) via a long server name in the
PROXY-CONNECT address in the command line (CVE-2014-0019).

The updated packages have been upgraded to the 1.7.2.3 version which
is not vulnerable to this issue.

See also :

http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt

Solution :

Update the affected socat package.

Risk factor :

Low / CVSS Base Score : 1.9
(CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 1.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 72531 ()

Bugtraq ID: 65201

CVE ID: CVE-2014-0019

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now