CVE-2013-3571
Publication date 8 May 2014
Last updated 24 July 2024
Ubuntu priority
Description
socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| socat | ||
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty |
Not affected
|
|
Patch details
| Package | Patch details |
|---|---|
| socat |