vendor:
socat
by:
CoKi
7.5
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: socat
Affected Version From: 1.4.0.2
Affected Version To: 1.4.0.2
Patch Exists: NO
Related CWE: CVE not mentioned
CPE: a:socat_project:socat:1.4.0.2
Metasploit:
https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-23499/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2022-3172/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2021-37698/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2021-37698/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/redhat-openshift-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2020-25686/, https://www.rapid7.com/db/?q=CVE+not+mentioned&type=&page=2, https://www.rapid7.com/db/?q=CVE+not+mentioned&type=&page=3, https://www.rapid7.com/db/?q=CVE+not+mentioned&type=&page=2
Platforms Tested: Slackware 9.0 / 9.1 / 10.0
2004
Socat Format String Vulnerability
This is a local exploit for the socat <= 1.4.0.2 version. It is a proof of concept for the vulnerability. The exploit allows an attacker to execute arbitrary code by exploiting a format string vulnerability in the socat program. The vulnerability occurs due to improper handling of user-supplied format string arguments, which can be exploited to overwrite memory and execute arbitrary code.
Mitigation:
Upgrade to a version of socat that is not affected by this vulnerability.