Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3:5.18-1", "binary_name": "stunnel4" }, { "binary_version": "3:5.18-1", "binary_name": "stunnel4-dbgsym" } ] }