Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 009-1 (stunnel)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

The remote host is missing an update to stunnel announced via advisory DSA 009-1.

Insight

Insight

Lez discovered a format string problem in stunnel (a tool to create Universal SSL tunnel for other network daemons). Brian Hatch responded by stating he was already preparing a new release with multiple security fixes: 1. the PRNG (pseudo-random generated) was not seeded correctly. This only affects operation on operating systems without a secure random generator (like Linux) 2. Pid files were not created securely, making stunnel vulnerable to a symlink attack 3. There was an insecure syslog() call which could be exploited if the user could manage to insert text into the logged text. At least one way to exploit this using faked identd responses was demonstrated by Lez. These problems have been fixed in version 3.10-0potato1.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20009-1

Common Vulnerabilities and Exposures (CVE)