VYPR

rpm package

opensuse/stunnel&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/stunnel&distro=openSUSE%20Tumbleweed

Vulnerabilities (6)

  • CVE-2015-3644May 14, 2015
    affected < 5.65-1.1fixed 5.65-1.1

    Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

  • CVE-2014-0160HigKEVApr 7, 2014
    affected < 5.38-1.1fixed 5.38-1.1

    The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by re

  • CVE-2014-0016Mar 24, 2014
    affected < 5.38-1.1fixed 5.38-1.1

    stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for E

  • CVE-2013-1762Mar 8, 2013
    affected < 5.38-1.1fixed 5.38-1.1

    stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

  • CVE-2011-2940Aug 25, 2011
    affected < 5.38-1.1fixed 5.38-1.1

    stunnel 4.40 and 4.41 might allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.

  • CVE-2010-3864Nov 17, 2010
    affected < 5.38-1.1fixed 5.38-1.1

    Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow,