Vulnerability Description
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stunnel | Stunnel | <= 4.54 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2013-0714.html
- http://www.debian.org/security/2013/dsa-2664
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:130
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0097
- https://www.stunnel.org/CVE-2013-1762.htmlVendor Advisory
- http://rhn.redhat.com/errata/RHSA-2013-0714.html
- http://www.debian.org/security/2013/dsa-2664
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:130
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0097
- https://www.stunnel.org/CVE-2013-1762.htmlVendor Advisory
FAQ
What is CVE-2013-1762?
CVE-2013-1762 is a vulnerability with a CVSS score of 6.6 (MEDIUM). stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary ...
How severe is CVE-2013-1762?
CVE-2013-1762 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1762?
Check the references section above for vendor advisories and patch information. Affected products include: Stunnel Stunnel.