NetCat is prone to a remotely exploitable buffer overflow. This issue is exposed when the program handles a client request when listening in exec mode, which is specified by the '-e' command line option. Successful exploitation will allow execution of arbitrary code in the context of the program. It is noted that this issue affects the Windows port, and is not known or confirmed to affect the UNIX-based netcat utility.
NetCat is prone to a remotely exploitable buffer overflow. This issue is exposed when the program handles a client request when listening in exec mode, which is specified by the '-e' command line option. Successful exploitation will allow execution of arbitrary code in the context of the program. It is noted that this issue affects the Windows port, and is not known or confirmed to affect the UNIX-based netcat utility.