2.6 Low
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
78.1%
Issue Overview:
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
Affected Packages:
socat
Issue Correction:
Run yum update socat to update your system.
New Packages:
i686:
socat-debuginfo-1.7.2.2-1.8.amzn1.i686
socat-1.7.2.2-1.8.amzn1.i686
src:
socat-1.7.2.2-1.8.amzn1.src
x86_64:
socat-1.7.2.2-1.8.amzn1.x86_64
socat-debuginfo-1.7.2.2-1.8.amzn1.x86_64
Red Hat: CVE-2013-3571
Mitre: CVE-2013-3571
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | socat-debuginfo | < 1.7.2.2-1.8.amzn1 | socat-debuginfo-1.7.2.2-1.8.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | socat | < 1.7.2.2-1.8.amzn1 | socat-1.7.2.2-1.8.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | socat | < 1.7.2.2-1.8.amzn1 | socat-1.7.2.2-1.8.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | socat-debuginfo | < 1.7.2.2-1.8.amzn1 | socat-debuginfo-1.7.2.2-1.8.amzn1.x86_64.rpm |