漏洞信息详情
Socat远程格式字符串漏洞
漏洞简介
socat 1.4.0.3版本及之前版本的error.c中的_msg函数在被用作HTTP代理客户端并且带-ly运行时,存在格式字符串漏洞。远程攻击者或本地用户可以借助系统记录消息中的格式字符串说明符执行任意代码。
漏洞公告
The vendor has released a new version of the package to address this issue: Gentoo has released an advisory (GLSA 200410-26) to address this issue. Please see the referenced advisory for more information. Gentoo users may carry out the following actions to update their computers: emerge --sync emerge --ask --oneshot --verbose ">=net-misc/socat-1.4.0.3" socat socat 1.0 .x
- socat socat-1.4.0.3.tar.gz http://www.dest-unreach.org/socat/download/socat-1.4.0.3.tar.gz
- socat socat-1.4.0.3.tar.gz http://www.dest-unreach.org/socat/download/socat-1.4.0.3.tar.gz
- socat socat-1.4.0.3.tar.gz http://www.dest-unreach.org/socat/download/socat-1.4.0.3.tar.gz
- socat socat-1.4.0.3.tar.gz http://www.dest-unreach.org/socat/download/socat-1.4.0.3.tar.gz
- socat socat-1.4.0.3.tar.gz http://www.dest-unreach.org/socat/download/socat-1.4.0.3.tar.gz
- socat socat-1.4.0.3.tar.gz http://www.dest-unreach.org/socat/download/socat-1.4.0.3.tar.gz
- socat socat-1.4.0.3.tar.gz http://www.dest-unreach.org/socat/download/socat-1.4.0.3.tar.gz
参考网址
来源: XF 名称: socat-format-string(17822) 链接:http://xforce.iss.net/xforce/xfdb/17822 来源: BID 名称: 11505 链接:http://www.securityfocus.com/bid/11505 来源: www.nosystem.com.ar 链接:http://www.nosystem.com.ar/advisories/advisory-07.txt 来源: GENTOO 名称: GLSA-200410-26 链接:http://www.gentoo.org/security/en/glsa/glsa-200410-26.xml 来源: SECUNIA 名称: 12936 链接:http://secunia.com/advisories/12936/ 来源: www.dest-unreach.org 链接:http://www.dest-unreach.org/socat/advisory/socat-adv-1.html
受影响实体
- Socat Socat:1.4.0.2<!--2000-1-1-->
- Socat Socat:1.0.3.0<!--2000-1-1-->
- Socat Socat:1.0.4.0<!--2000-1-1-->
- Socat Socat:1.0.4.1<!--2000-1-1-->
- Socat Socat:1.0.4.2<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...