Search

published date: December 31, 2004

CVE-2004-1484 : Format String Vulnerability

Description

Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.

Product(s):

  • Socat 1.0.3.0
  • Socat 1.0.4.0
  • Socat 1.0.4.1
  • Socat 1.0.4.2
  • Socat 1.1.0.0
  • Socat 1.1.0.1

Question to Ask Vendors:

  1. Can you confirm whether your systems are affected by CVE-2004-1484, and if so, what steps are you currently taking to mitigate this vulnerability?
  2. What is your estimated timeline for fully resolving CVE-2004-1484 in your products or services, and how will you communicate updates on this issue to us as your customer?

READY TO GET RESULTS YOU CAN TRUST?