dad2e58931
Changes: ####################### V 1.7.3.1: security: Socat security advisory 8 A stack overflow in vulnerability was found that can be triggered when command line arguments (complete address specifications, host names, file names) are longer than 512 bytes. Successful exploitation might allow an attacker to execute arbitrary code with the privileges of the socat process. This vulnerability can only be exploited when an attacker is able to inject data into socat's command line. A vulnerable scenario would be a CGI script that reads data from clients and uses (parts of) this data as hostname for a Socat invocation. Test: NESTEDOVFL Credits to Takumi Akiyama for finding and reporting this issue. Socat security advisory 7 MSVR-1499 In the OpenSSL address implementation the hard coded 1024 bit DH p parameter was not prime. The effective cryptographic strength of a key exchange using these parameters was weaker than the one one could get by using a prime p. Moreover, since there is no indication of how these parameters were chosen, the existence of a trapdoor that makes possible for an eavesdropper to recover the shared secret from a key exchange that uses them cannot be ruled out. Futhermore, 1024bit is not considered sufficiently secure. Fix: generated a new 2048bit prime. Thanks to Santiago Zanella-Beguelin and Microsoft Vulnerability Research (MSVR) for finding and reporting this issue.
7 lines
471 B
Text
7 lines
471 B
Text
$NetBSD: distinfo,v 1.23 2016/02/02 16:08:01 leot Exp $
|
|
|
|
SHA1 (socat-1.7.3.1.tar.gz) = a6f1d8ab3e85f565dbe172f33a9be6708dd52ffb
|
|
RMD160 (socat-1.7.3.1.tar.gz) = 471f7edfad9610ca4a164030796f0706636b059f
|
|
SHA512 (socat-1.7.3.1.tar.gz) = a2a550cd02982befdd9d410e510546e7a875c01b0d8ea27d949868fbe3cbbf1b126e96080b186956ae51a3b445f7702688465dc97cde75f6a858759a99622e75
|
|
Size (socat-1.7.3.1.tar.gz) = 606049 bytes
|
|
SHA1 (patch-mytypes.h) = 94df5a47f7fbadf867e0994edeeb857b467021df
|