Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-20230

Опубликовано: 11 окт. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

A flaw was found in stunnel, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

Отчет

This issue did not affect the versions of stunnel as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they did not include support for the "redirect" option.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5stunnelNot affected
Red Hat Enterprise Linux 6stunnelNot affected
Red Hat Enterprise Linux 7stunnelNot affected
Red Hat Enterprise Linux 9stunnelNot affected
Red Hat Enterprise Linux 8stunnelFixedRHSA-2021:061822.02.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportstunnelFixedRHSA-2021:062022.02.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportstunnelFixedRHSA-2021:061922.02.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1925226stunnel: client certificate not correctly verified when redirect and verifyChain options are used

EPSS

Процентиль: 43%
0.00209
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
nvd
почти 5 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
msrc
почти 4 года назад

A flaw was found in stunnel before 5.57 where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority which is not the one accepted by the stunnel server to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.5
debian
почти 5 лет назад

A flaw was found in stunnel before 5.57, where it improperly validates ...

suse-cvrf
почти 5 лет назад

Security update for stunnel

EPSS

Процентиль: 43%
0.00209
Низкий

7.5 High

CVSS3