Bug 1057746 (CVE-2014-0019) - CVE-2014-0019 socat: PROXY-CONNECT address overflow
Summary: CVE-2014-0019 socat: PROXY-CONNECT address overflow
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2014-0019
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1057748 1058996 1081919
Blocks: 1057751
TreeView+ depends on / blocked
 
Reported: 2014-01-24 17:54 UTC by Vincent Danen
Modified: 2023-05-12 02:01 UTC (History)
11 users (show)

Fixed In Version: socat 1.7.2.3, socat 2.0.0b7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-07-18 00:32:16 UTC
Embargoed:


Attachments (Terms of Use)
upstream patch to correct the flaw (4.22 KB, patch)
2014-01-24 17:56 UTC, Vincent Danen
no flags Details | Diff

Description Vincent Danen 2014-01-24 17:54:26 UTC
Florian Weimer of the Red Hat Product Security Team discovered a denial of service flaw in socat. Due to a missing check during assembly of the HTTP request line a long target server name (<hostname> in the documentation) of the PROXY-CONNECT address can cause a stack buffer overrun. Exploitation requires that the attacker is able to provide the target server name to the PROXY-CONNECT address in the command line. This can happen for example in scripts that receive data from untrusted sources.

This flaw affects socat versions 1.3.0.0 through to 1.7.2.2; it is corrected in 1.7.2.3.


Acknowledgements:

This issue was discovered by Florian Weimer of the Red Hat Product Security Team.

Comment 2 Vincent Danen 2014-01-24 17:56:33 UTC
Created attachment 855124 [details]
upstream patch to correct the flaw

Comment 4 Vincent Danen 2014-01-28 23:28:05 UTC
This issue is now public:

http://seclists.org/oss-sec/2014/q1/159

Comment 5 Vincent Danen 2014-01-28 23:30:16 UTC
Created socat tracking bugs for this issue:

Affects: fedora-all [bug 1058996]

Comment 6 Fedora Update System 2014-02-12 14:38:49 UTC
socat-1.7.2.3-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2014-02-12 14:52:31 UTC
socat-1.7.2.3-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2014-02-20 07:02:08 UTC
socat-1.7.2.3-1.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Kurt Seifried 2014-07-18 00:25:51 UTC
Statement:

The Red Hat Security Response Team has rated this issue as having Low security impact on OpenShift Enterprise, a future update may address this flaw.


Note You need to log in before you can comment on or make changes to this bug.