CVE-2013-3571 Affecting socat package, versions <1.7.1.3-1.5


Severity

Recommended
0.0
low
0
10

Based on Debian security rating.

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.58% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-SOCAT-5695855
  • published8 May 2014
  • disclosed8 May 2014

Introduced: 8 May 2014

CVE-2013-3571  (opens in a new tab)

How to fix?

Upgrade Debian:13 socat to version 1.7.1.3-1.5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream socat package and not the socat package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.

CVSS Scores

version 3.1