Lucene search

K
mageiaGentoo FoundationMGASA-2015-0289
HistoryJul 27, 2015 - 8:45 p.m.

Updated stunnel package fixes security vulnerability

2015-07-2720:45:18
Gentoo Foundation
advisories.mageia.org
7

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

74.0%

Johan Olofsson discovered an authentication bypass vulnerability in Stunnel, a program designed to work as an universal SSL tunnel for network daemons. When Stunnel in server mode is used with the redirect option and certificate-based authentication is enabled with “verify = 2” or higher, then only the initial connection is redirected to the hosts specified with “redirect”. This allows a remote attacker to bypass authentication (CVE-2015-3644).

OSVersionArchitecturePackageVersionFilename
Mageia5noarchstunnel< 5.03-4.1stunnel-5.03-4.1.mga5

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.004 Low

EPSS

Percentile

74.0%