Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-20230

Опубликовано: 11 окт. 2020
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

A flaw was found in stunnel, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

Отчет

This issue did not affect the versions of stunnel as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they did not include support for the "redirect" option.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5stunnelNot affected
Red Hat Enterprise Linux 6stunnelNot affected
Red Hat Enterprise Linux 7stunnelNot affected
Red Hat Enterprise Linux 9stunnelNot affected
Red Hat Enterprise Linux 8stunnelFixedRHSA-2021:061822.02.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportstunnelFixedRHSA-2021:062022.02.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportstunnelFixedRHSA-2021:061922.02.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1925226stunnel: client certificate not correctly verified when redirect and verifyChain options are used

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
nvd
больше 4 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
debian
больше 4 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates ...

suse-cvrf
больше 4 лет назад

Security update for stunnel

suse-cvrf
около 4 лет назад

Security update for stunnel

7.5 High

CVSS3