Code Injection in Stunnel - CVE-2013-1762

 

Code Injection in Stunnel - CVE-2013-1762

Published: March 8, 2013 / Updated: August 11, 2020


Vulnerability identifier: #VU43015
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-1762
CWE-ID: CWE-94
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Stunnel.org
Affected software:
Stunnel

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.


How to mitigate CVE-2013-1762

Install update from vendor's website.

Sources