CVE-2010-2799

Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
VendorProductVersion
dest-unreachsocat
1.5.0.0
dest-unreachsocat
1.6.0.0
dest-unreachsocat
1.6.0.1
dest-unreachsocat
1.7.0.0
dest-unreachsocat
1.7.0.1
dest-unreachsocat
1.7.1.0
dest-unreachsocat
1.7.1.1
dest-unreachsocat
2.0.0:b1
dest-unreachsocat
2.0.0:b2
dest-unreachsocat
2.0.0:b3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
socat
bullseye
1.7.4.1-3
fixed
bookworm
1.7.4.4-2
fixed
sid
1.8.0.1-2
fixed
trixie
1.8.0.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
socat
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
not-affected
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
ignored
karmic
ignored
jaunty
Fixed 1.6.0.1-1+lenny1build0.9.04.1
released
hardy
ignored
dapper
ignored