CVE-2013-3571

EUVD-2013-3505
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:N/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 74%
Affected Products (NVD)
VendorProductVersion
dest-unreachsocat
1.2.0.0
dest-unreachsocat
1.3.0.0
dest-unreachsocat
1.3.0.1
dest-unreachsocat
1.3.1.0
dest-unreachsocat
1.3.2.0
dest-unreachsocat
1.3.2.1
dest-unreachsocat
1.3.2.2
dest-unreachsocat
1.4.0.0
dest-unreachsocat
1.4.0.1
dest-unreachsocat
1.4.0.2
dest-unreachsocat
1.4.0.3
dest-unreachsocat
1.4.1.0
dest-unreachsocat
1.4.2.0
dest-unreachsocat
1.4.3.0
dest-unreachsocat
1.4.3.1
dest-unreachsocat
1.5.0.0
dest-unreachsocat
1.6.0.0
dest-unreachsocat
1.6.0.1
dest-unreachsocat
1.7.0.0
dest-unreachsocat
1.7.0.1
dest-unreachsocat
1.7.1.0
dest-unreachsocat
1.7.1.1
dest-unreachsocat
1.7.1.2
dest-unreachsocat
1.7.1.3
dest-unreachsocat
1.7.2.0
dest-unreachsocat
1.7.2.1
dest-unreachsocat
2.0.0:b1
dest-unreachsocat
2.0.0:b2
dest-unreachsocat
2.0.0:b3
dest-unreachsocat
2.0.0:b4
dest-unreachsocat
2.0.0:b5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
socat
bookworm
1.7.4.4-2
fixed
bullseye
1.7.4.1-3
fixed
sid
1.8.0.1-2
fixed
squeeze
no-dsa
trixie
1.8.0.1-2
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
socat
lucid
ignored
precise
ignored
quantal
ignored
raring
ignored
saucy
ignored
trusty
not-affected
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected