FreeBSD : socat -- buffer overflow with data from command line (a4c9e12d-88b7-11e3-8ada-10bf48e1088e)

Low Nessus Plugin ID 72206


The remote FreeBSD host is missing a security-related update.


Florian Weimer of the Red Hat Product Security Team reports :

Due to a missing check during assembly of the HTTP request line a long target server name in the PROXY-CONNECT address can cause a stack buffer overrun. Exploitation requires that the attacker is able to provide the target server name to the PROXY-CONNECT address in the command line. This can happen for example in scripts that receive data from untrusted sources.


Update the affected package.

See Also

Plugin Details

Severity: Low

ID: 72206

File Name: freebsd_pkg_a4c9e12d88b711e38ada10bf48e1088e.nasl

Version: $Revision: 1.2 $

Type: local

Published: 2014/01/30

Modified: 2014/02/06

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 1.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:socat, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2014/01/29

Vulnerability Publication Date: 2014/01/24

Reference Information

CVE: CVE-2014-0019