Lucene search

K
StunnelStunnel3.21

6 matches found

CVE
CVE
added 2003/03/31 5:0 a.m.78 views

CVE-2003-0147

OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ...

5CVSS9AI score0.21349EPSS
CVE
CVE
added 2014/03/24 4:31 p.m.62 views

CVE-2014-0016

stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA ce...

4.3CVSS7.2AI score0.00312EPSS
CVE
CVE
added 2002/06/25 4:0 a.m.49 views

CVE-2002-0002

Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.

7.5CVSS7.4AI score0.14916EPSS
CVE
CVE
added 2008/05/23 3:32 p.m.39 views

CVE-2008-2420

The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.

6.8CVSS6.3AI score0.00488EPSS
CVE
CVE
added 2003/10/20 4:0 a.m.35 views

CVE-2003-0740

Stunnel 4.00, and 3.24 and earlier, leaks a privileged file descriptor returned by listen(), which allows local users to hijack the Stunnel server.

4.6CVSS6.1AI score0.00116EPSS
CVE
CVE
added 2008/05/22 1:9 p.m.31 views

CVE-2008-2400

Unspecified vulnerability in stunnel before 4.23, when running as a service on Windows, allows local users to gain privileges via unknown attack vectors.

7.2CVSS6.3AI score0.00051EPSS