CVE-2013-3571

socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
2.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:N/I:N/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
dest-unreachsocat
1.2.0.0
dest-unreachsocat
1.3.0.0
dest-unreachsocat
1.3.0.1
dest-unreachsocat
1.3.1.0
dest-unreachsocat
1.3.2.0
dest-unreachsocat
1.3.2.1
dest-unreachsocat
1.3.2.2
dest-unreachsocat
1.4.0.0
dest-unreachsocat
1.4.0.1
dest-unreachsocat
1.4.0.2
dest-unreachsocat
1.4.0.3
dest-unreachsocat
1.4.1.0
dest-unreachsocat
1.4.2.0
dest-unreachsocat
1.4.3.0
dest-unreachsocat
1.4.3.1
dest-unreachsocat
1.5.0.0
dest-unreachsocat
1.6.0.0
dest-unreachsocat
1.6.0.1
dest-unreachsocat
1.7.0.0
dest-unreachsocat
1.7.0.1
dest-unreachsocat
1.7.1.0
dest-unreachsocat
1.7.1.1
dest-unreachsocat
1.7.1.2
dest-unreachsocat
1.7.1.3
dest-unreachsocat
1.7.2.0
dest-unreachsocat
1.7.2.1
dest-unreachsocat
2.0.0:b1
dest-unreachsocat
2.0.0:b2
dest-unreachsocat
2.0.0:b3
dest-unreachsocat
2.0.0:b4
dest-unreachsocat
2.0.0:b5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
socat
bullseye
1.7.4.1-3
fixed
squeeze
no-dsa
wheezy
no-dsa
bookworm
1.7.4.4-2
fixed
sid
1.8.0.1-2
fixed
trixie
1.8.0.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
socat
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
not-affected
saucy
ignored
raring
ignored
quantal
ignored
precise
ignored
lucid
ignored