Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2015/dsa-3299 - | |
References | () http://www.securityfocus.com/bid/74659 - | |
References | () http://www.securitytracker.com/id/1032324 - | |
References | () https://www.stunnel.org/CVE-2015-3644.html - Patch, Vendor Advisory |
Information
Published : 2015-05-14 00:59
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3644
Mitre link : CVE-2015-3644
CVE.ORG link : CVE-2015-3644
JSON object : View
Products Affected
stunnel
- stunnel
CWE
CWE-284
Improper Access Control