Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-997q-cp6v-cm6w

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

EPSS

Процентиль: 83%
0.0201
Низкий

Дефекты

CWE-94

Связанные уязвимости

ubuntu
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

redhat
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

nvd
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

debian
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM ...

oracle-oval
больше 12 лет назад

ELSA-2013-0714: stunnel security update (MODERATE)

EPSS

Процентиль: 83%
0.0201
Низкий

Дефекты

CWE-94