MGASA-2015-0289

Source
https://advisories.mageia.org/MGASA-2015-0289.html
Import Source
https://advisories.mageia.org/MGASA-2015-0289.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0289
Related
Published
2015-07-27T17:45:18Z
Modified
2015-07-27T17:34:55Z
Summary
Updated stunnel package fixes security vulnerability
Details

Johan Olofsson discovered an authentication bypass vulnerability in Stunnel, a program designed to work as an universal SSL tunnel for network daemons. When Stunnel in server mode is used with the redirect option and certificate-based authentication is enabled with "verify = 2" or higher, then only the initial connection is redirected to the hosts specified with "redirect". This allows a remote attacker to bypass authentication (CVE-2015-3644).

References
Credits

Affected packages

Mageia:5 / stunnel

Package

Name
stunnel
Purl
pkg:rpm/mageia/stunnel?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.03-4.1.mga5

Ecosystem specific

{
    "section": "core"
}