CVE-2015-3644

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-3644
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2015-3644.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2015-3644
Related
Published
2015-05-14T00:59:06Z
Modified
2024-11-21T02:29:33Z
Summary
[none]
Details

Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.

References

Affected packages

Debian:11 / stunnel4

Package

Name
stunnel4
Purl
pkg:deb/debian/stunnel4?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:5.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / stunnel4

Package

Name
stunnel4
Purl
pkg:deb/debian/stunnel4?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:5.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / stunnel4

Package

Name
stunnel4
Purl
pkg:deb/debian/stunnel4?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3:5.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}