Updated socat package fixes security vulnerability
Publication date: 16 Feb 2014Modification date: 16 Feb 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-0019
Description
Due to a missing check in socat before 2.0.0-b7 during assembly of the HTTP
request line, a long target server name (<hostname> in the documentation) in
the PROXY-CONNECT address can cause a stack buffer overrun. Exploitation
requires that the attacker is able to provide the target server name to the
PROXY-CONNECT address in the command line. This can happen, for example, in
scripts that receive data from untrusted sources (CVE-2014-0019).
References
SRPMS
3/core
- socat-2.0.0-0.b7.1.mga3
4/core
- socat-2.0.0-0.b7.1.mga4