6.6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:P/I:P/A:C
stunnel is vulnerable to remote code execution (RCE) attacks. The vulnerability exists as stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
CPE | Name | Operator | Version |
---|---|---|---|
stunnel | eq | 4.29__2.el6 |
rhn.redhat.com/errata/RHSA-2013-0714.html
www.debian.org/security/2013/dsa-2664
www.mandriva.com/security/advisories?name=MDVSA-2013:130
access.redhat.com/security/updates/classification/#moderate
rhn.redhat.com/errata/RHSA-2013-0714.html
wiki.mageia.org/en/Support/Advisories/MGASA-2013-0097
www.stunnel.org/CVE-2013-1762.html