Mandriva Linux Security Advisory 2010-183 – Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments. The updated packages have been patched to correct this issue.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/93890/MDVSA-2010-183.txt
Source: https://packetstormsecurity.com/files/93890/Mandriva-Linux-Security-Advisory-2010-183.html

