Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3644

Опубликовано: 14 мая 2015
Источник: redhat
CVSS2: 6.4
EPSS Низкий

Описание

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

Отчет

Not vulnerable. This issue did not affect the versions of stunnel as shipped with Red Hat Enterprise Linux 5, 6, and 7.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5stunnelNot affected
Red Hat Enterprise Linux 6stunnelNot affected
Red Hat Enterprise Linux 7stunnelNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1221673stunnel: authentication bypass with the "redirect" option

EPSS

Процентиль: 48%
0.00248
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

nvd
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

debian
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not re ...

suse-cvrf
больше 10 лет назад

Security update for stunnel

github
больше 3 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

EPSS

Процентиль: 48%
0.00248
Низкий

6.4 Medium

CVSS2