Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-1484

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2004-1484
Last Modified 05 Sep 2008 04:41:31
Published 31 Dec 2004 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-1484

Summary

Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.

Vulnerable Systems

Application

  • Socat 1.0.3.0

  • Socat 1.0.4.0

  • Socat 1.0.4.1

  • Socat 1.0.4.2

  • Socat 1.1.0.0

  • Socat 1.1.0.1

  • Socat 1.2.0.0

  • Socat 1.3.0.0

  • Socat 1.3.0.1

  • Socat 1.3.1.0

  • Socat 1.3.2.0

  • Socat 1.3.2.1

  • Socat 1.3.2.2

  • Socat 1.4.0.0

  • Socat 1.4.0.1

  • Socat 1.4.0.2


References

XF - socat-format-string(17822)

BID - 11505

MISC - http://www.nosystem.com.ar/advisories/advisory-07.txt

GENTOO - GLSA-200410-26

SECUNIA - 12936

CONFIRM - http://www.dest-unreach.org/socat/advisory/socat-adv-1.html


Last Updated: 27 May 2016 10:39:03