Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
https://github.com/msmania/poodim/commit/6340d5d2c81e55e61522c4b40a6cdd5c39738cc6
https://bugzilla.redhat.com/show_bug.cgi?id=620426
http://www.dest-unreach.org/socat/download/socat-1.7.1.3.patch
http://www.dest-unreach.org/socat/contrib/socat-secadv2.html
http://www.debian.org/security/2010/dsa-2090