Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-1762

Опубликовано: 08 мар. 2013
Источник: debian
EPSS Низкий

Описание

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
stunnel4fixed3:4.53-1.1package

EPSS

Процентиль: 83%
0.0201
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

redhat
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

nvd
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

github
больше 3 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

oracle-oval
больше 12 лет назад

ELSA-2013-0714: stunnel security update (MODERATE)

EPSS

Процентиль: 83%
0.0201
Низкий