Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3644

Опубликовано: 14 мая 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8

Описание

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

РелизСтатусПримечание
artful

not-affected

3:5.18-1
bionic

not-affected

3:5.18-1
cosmic

not-affected

3:5.18-1
devel

not-affected

3:5.18-1
esm-apps/bionic

not-affected

3:5.18-1
esm-apps/xenial

not-affected

3:5.18-1
esm-infra-legacy/trusty

not-affected

code not present
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

not-affected

code not present

Показывать по

EPSS

Процентиль: 48%
0.00248
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

nvd
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

debian
больше 10 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not re ...

suse-cvrf
больше 10 лет назад

Security update for stunnel

github
больше 3 лет назад

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

EPSS

Процентиль: 48%
0.00248
Низкий

5.8 Medium

CVSS2