Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=stunnel-users&m=100869449828705&w=2 - | |
References | () http://online.securityfocus.com/archive/1/247427 - | |
References | () http://online.securityfocus.com/archive/1/248149 - | |
References | () http://stunnel.mirt.net/news.html - Vendor Advisory | |
References | () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-004.php3 - | |
References | () http://www.redhat.com/support/errata/RHSA-2002-002.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3748 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7741 - |
Information
Published : 2002-01-31 05:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0002
Mitre link : CVE-2002-0002
CVE.ORG link : CVE-2002-0002
JSON object : View
Products Affected
stunnel
- stunnel
engardelinux
- secure_linux
mandrakesoft
- mandrake_linux
redhat
- linux
CWE