Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.dest-unreach.org/socat/advisory/socat-adv-1.html http://www.nosystem.com.ar/advisories/advisory-07.txt http://www.vuxml.org/freebsd/f3017ce1-32a4-11d9-a9e7-0001020eed82.html
Insight
The following package is affected: socat
The installed version of socat has a format string vulnerability in the _msg function when used as an HTTP proxy client and run with the -ly option.
An attacker can execute arbitrary code via format
string attack to syslog mesages.
Severity
Classification
-
CVE CVE-2004-1484 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities