Vulnerability Description
Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stunnel | Stunnel | 5.00 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2015/dsa-3299
- http://www.securityfocus.com/bid/74659
- http://www.securitytracker.com/id/1032324
- https://www.stunnel.org/CVE-2015-3644.htmlPatchVendor Advisory
- http://www.debian.org/security/2015/dsa-3299
- http://www.securityfocus.com/bid/74659
- http://www.securitytracker.com/id/1032324
- https://www.stunnel.org/CVE-2015-3644.htmlPatchVendor Advisory
FAQ
What is CVE-2015-3644?
CVE-2015-3644 is a vulnerability with a CVSS score of 5.8 (MEDIUM). Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authenticat...
How severe is CVE-2015-3644?
CVE-2015-3644 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3644?
Check the references section above for vendor advisories and patch information. Affected products include: Stunnel Stunnel.