Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3644

Опубликовано: 14 мая 2015
Источник: debian
EPSS Низкий

Описание

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
stunnel4fixed3:5.18-1package
stunnel4not-affectedwheezypackage
stunnel4not-affectedsqueezepackage

Примечания

  • https://www.stunnel.org/CVE-2015-3644.html

EPSS

Процентиль: 48%
0.00248
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

redhat
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

nvd
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

suse-cvrf
больше 10 лет назад

Security update for stunnel

github
больше 3 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

EPSS

Процентиль: 48%
0.00248
Низкий