Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1762

Опубликовано: 08 мар. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.6

Описание

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

РелизСтатусПримечание
devel

not-affected

3:4.53-1.1ubuntu1
hardy

ignored

end of life
lucid

released

3:4.29-1+squeeze1build0.10.04.1
oneiric

ignored

end of life
precise

released

3:4.42-1ubuntu0.1
quantal

released

3:4.53-1ubuntu0.1
raring

ignored

end of life
saucy

not-affected

3:4.53-1.1
upstream

released

4.55,3:4.53-1.1

Показывать по

EPSS

Процентиль: 83%
0.0201
Низкий

6.6 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

nvd
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

debian
больше 12 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM ...

github
больше 3 лет назад

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.

oracle-oval
больше 12 лет назад

ELSA-2013-0714: stunnel security update (MODERATE)

EPSS

Процентиль: 83%
0.0201
Низкий

6.6 Medium

CVSS2