Description
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
CVSS vector
AV:N/AC:H/C:P/I:P/A:CExploitability: 4.9 | Impact: 8.5 Affected Packages1 packages
🔴Vulnerability Details
3GHSAGHSA-997q-cp6v-cm6w: stunnel 4↗2022-05-17 ▶ OSVCVE-2013-1762: stunnel 4↗2013-03-08 ▶ CVEListCVE-2013-1762: stunnel 4↗2013-03-08 ▶ 📋Vendor Advisories
2Red HatStunnel: buffer overflow vulnerability due to incorrect integer conversion in the NTLM authentication of the CONNECT protocol negotiation↗2013-03-03 ▶ DebianCVE-2013-1762: stunnel4 - stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentica...↗2013 ▶ 💬Community
2BugzillaCVE-2013-4452 JBoss ON: World readable configuration files expose sensitive data↗2013-10-22 ▶ BugzillaCVE-2013-1762 Stunnel: buffer overflow vulnerability due to incorrect integer conversion in the NTLM authentication of the CONNECT protocol negotiation↗2013-03-04 ▶