A stack overflow vulnerability was found that can be triggered when command line arguments (complete address specifications, host names, file names) are longer than 512 bytes. Successful exploitation might allow an attacker to execute arbitrary code with the privileges of the socat process. This vulnerability can only be exploited when an attacker is able to inject data into socat's command line. A vulnerable scenario would be a CGI script that reads data from clients and uses (parts of) this data as hostname for a Socat invocation. Affected versions: 1.5.0.0 - 1.7.3.0 2.0.0-b1 - 2.0.0-b8 Reference: http://seclists.org/oss-sec/2016/q1/262
Created socat tracking bugs for this issue: Affects: fedora-all [bug 1303888] Affects: epel-all [bug 1303889]
Upstream commit: http://repo.or.cz/socat.git/commitdiff/226c555edb82f6901d7d7448d93e6d09b1132c73 External References: http://www.dest-unreach.org/socat/contrib/socat-secadv8.html
Overflow is triggered by long command line arguments. While these may be based on untrusted input, they typically are not. There's currently no plan to correct this in Red Hat Enterprise Linux. The fix may be added if the component is updated to fixed upstream version in future updates.