Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.703299
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 3299-1 (stunnel4 - security update)
Zusammenfassung:Johan Olofsson discovered an authentication bypass vulnerability in;Stunnel, a program designed to work as an universal SSL tunnel for;network daemons. When Stunnel in server mode is used with the redirect;option and certificate-based authentication is enabled with verify = 2 or higher, then only the initial connection is redirected to the hosts;specified with redirect;. This allows a remote attacker to bypass;authentication.
Beschreibung:Summary:
Johan Olofsson discovered an authentication bypass vulnerability in
Stunnel, a program designed to work as an universal SSL tunnel for
network daemons. When Stunnel in server mode is used with the redirect
option and certificate-based authentication is enabled with verify = 2 or higher, then only the initial connection is redirected to the hosts
specified with redirect
. This allows a remote attacker to bypass
authentication.

Affected Software/OS:
stunnel4 on Debian Linux

Solution:
For the stable distribution (jessie), this problem has been fixed in
version 3:5.06-2+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version 3:5.18-1.

For the unstable distribution (sid), this problem has been fixed in
version 3:5.18-1.

We recommend that you upgrade your stunnel4 packages.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-3644
BugTraq ID: 74659
http://www.securityfocus.com/bid/74659
Debian Security Information: DSA-3299 (Google Search)
http://www.debian.org/security/2015/dsa-3299
http://www.securitytracker.com/id/1032324
CopyrightCopyright (c) 2015 Greenbone Networks GmbH http://greenbone.net

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.