rpm package
opensuse/stunnel&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/stunnel&distro=openSUSE%20Tumbleweed
Vulnerabilities (6)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-3644 | — | < 5.65-1.1 | 5.65-1.1 | May 14, 2015 | Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication. | ||
| CVE-2014-0160 | Hig | 7.5 | KEV | < 5.38-1.1 | 5.38-1.1 | Apr 7, 2014 | The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by re |
| CVE-2014-0016 | — | < 5.38-1.1 | 5.38-1.1 | Mar 24, 2014 | stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for E | ||
| CVE-2013-1762 | — | < 5.38-1.1 | 5.38-1.1 | Mar 8, 2013 | stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow. | ||
| CVE-2011-2940 | — | < 5.38-1.1 | 5.38-1.1 | Aug 25, 2011 | stunnel 4.40 and 4.41 might allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. | ||
| CVE-2010-3864 | — | < 5.38-1.1 | 5.38-1.1 | Nov 17, 2010 | Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, |
- CVE-2015-3644May 14, 2015affected < 5.65-1.1fixed 5.65-1.1
Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
- affected < 5.38-1.1fixed 5.38-1.1
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by re
- CVE-2014-0016Mar 24, 2014affected < 5.38-1.1fixed 5.38-1.1
stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for E
- CVE-2013-1762Mar 8, 2013affected < 5.38-1.1fixed 5.38-1.1
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
- CVE-2011-2940Aug 25, 2011affected < 5.38-1.1fixed 5.38-1.1
stunnel 4.40 and 4.41 might allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
- CVE-2010-3864Nov 17, 2010affected < 5.38-1.1fixed 5.38-1.1
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow,