The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of stunnel

OpenSSL: Man-in-the-Middle via X509_V_FLAG_X509_STRICT
An attacker can act as a Man-in-the-Middle via X509_V_FLAG_X509_STRICT on OpenSSL, in order to read or write data in the session...
6443733, CERTFR-2021-AVI-221, CERTFR-2021-AVI-235, cisco-sa-openssl-2021-GHY28dJd, cpuapr2021, CVE-2021-3450, FEDORA-2021-c11da301be, FEDORA-2021-d049f32a82, FEDORA-2021-d934acdb42, FEDORA-2021-f347d1c866, FreeBSD-SA-21:07.openssl, RHSA-2021:1024-01, SB10356, SSB-439005, TNS-2021-05, VIGILANCE-VUL-34943
stunnel: Man-in-the-Middle via Unauthenticated Requests Redirect
An attacker can act as a Man-in-the-Middle via Unauthenticated Requests Redirect on stunnel, in order to read or write data in the session...
VIGILANCE-VUL-34635
OpenSSL: NULL pointer dereference via X509_issuer_and_serial_hash
An attacker can force a NULL pointer to be dereferenced via X509_issuer_and_serial_hash() of OpenSSL, in order to trigger a denial of service...
6429603, 6443405, 6445489, 6463981, CERTFR-2021-AVI-124, CERTFR-2021-AVI-187, CERTFR-2021-AVI-467, cpuapr2021, CVE-2021-23841, DLA-2563-1, DLA-2565-1, DSA-4855-1, HT212528, HT212529, HT212530, HT212531, openSUSE-SU-2021:0427-1, openSUSE-SU-2021:0430-1, SSB-439005, SUSE-SU-2021:0725-1, SUSE-SU-2021:0752-1, SUSE-SU-2021:0753-1, SUSE-SU-2021:0754-1, SUSE-SU-2021:0755-1, SUSE-SU-2021:0769-1, SUSE-SU-2021:0793-1, SUSE-SU-2021:0939-1, SUSE-SU-2021:14667-1, SUSE-SU-2021:14670-1, SYMSA17570, USN-4738-1, USN-4745-1, VIGILANCE-VUL-34598
OpenSSL: buffer overflow via EVP_XUpdate
An attacker can trigger a buffer overflow via EVP_XUpdate of OpenSSL, in order to trigger a denial of service, and possibly to run code...
6429603, 6443405, 6445489, 6451671, 6463981, CERTFR-2021-AVI-124, CERTFR-2021-AVI-187, CERTFR-2021-AVI-467, cpuapr2021, CVE-2021-23840, DLA-2563-1, DLA-2565-1, DSA-4855-1, openSUSE-SU-2021:0357-1, openSUSE-SU-2021:0372-1, openSUSE-SU-2021:0427-1, openSUSE-SU-2021:0430-1, SSB-439005, STORM-2021-002, SUSE-SU-2021:0649-1, SUSE-SU-2021:0651-1, SUSE-SU-2021:0673-1, SUSE-SU-2021:0674-1, SUSE-SU-2021:0725-1, SUSE-SU-2021:0752-1, SUSE-SU-2021:0753-1, SUSE-SU-2021:0754-1, SUSE-SU-2021:0755-1, SUSE-SU-2021:0769-1, SUSE-SU-2021:0793-1, SUSE-SU-2021:0939-1, SUSE-SU-2021:14667-1, SUSE-SU-2021:14670-1, SYMSA17570, USN-4738-1, VIGILANCE-VUL-34597
stunnel: privilege escalation via Insecure OpenSSL Cross-compilation
An attacker can bypass restrictions via Insecure OpenSSL Cross-compilation of stunnel, in order to escalate his privileges...
VIGILANCE-VUL-29489
stunnel: privilege escalation via Client Certificate Check
An attacker can bypass restrictions via Client Certificate Check of stunnel, in order to escalate his privileges...
VIGILANCE-VUL-26599
OpenSSL: denial of service via Recursive ASN.1
An attacker can generate a fatal error via Recursive ASN.1 of OpenSSL, in order to trigger a denial of service...
2015887, 524146, bulletinjan2019, CERTFR-2018-AVI-155, cpuapr2019, cpujan2019, cpujul2018, cpujul2019, cpuoct2018, CVE-2018-0739, DLA-1330-1, DSA-2018-125, DSA-2020-030, DSA-4157-1, DSA-4158-1, FEDORA-2018-1b4f1158e2, FEDORA-2018-40dc8b8b16, FEDORA-2018-76afaf1961, FEDORA-2018-9490b422e7, ibm10715641, ibm10717211, ibm10717405, ibm10717409, ibm10719319, ibm10733605, ibm10738249, ibm10874728, JSA10990, K08044291, N1022561, openSUSE-SU-2018:0936-1, openSUSE-SU-2018:1057-1, openSUSE-SU-2018:2208-1, openSUSE-SU-2018:2238-1, openSUSE-SU-2018:2524-1, openSUSE-SU-2018:2695-1, PAN-SA-2018-0015, RHSA-2018:3090-01, RHSA-2018:3221-01, SA166, SB10243, SSA-181018, SUSE-SU-2018:0902-1, SUSE-SU-2018:0905-1, SUSE-SU-2018:0906-1, SUSE-SU-2018:0975-1, SUSE-SU-2018:2072-1, SUSE-SU-2018:2158-1, SUSE-SU-2018:2683-1, SUSE-SU-2020:0495-1, Synology-SA-18:51, USN-3611-1, USN-3611-2, VIGILANCE-VUL-25666
OpenSSL: out-of-bounds memory reading via X.509 IPAddressFamily
An attacker can force a read at an invalid address via X.509 IPAddressFamily of OpenSSL, in order to trigger a denial of service, or to obtain sensitive information...
2011879, 2013026, 2014367, bulletinapr2018, CERTFR-2017-AVI-391, cpuapr2018, cpuapr2019, cpujan2018, cpujan2019, cpujul2018, cpujul2019, cpuoct2018, CVE-2017-3735, DSA-4017-1, DSA-4018-1, FEDORA-2017-4cf72e2c11, FEDORA-2017-512a6c5aae, FEDORA-2017-55a3247cfd, FEDORA-2017-7f30914972, FEDORA-2017-dbec196dd8, FreeBSD-SA-17:11.openssl, HT208331, HT208394, ibm10715641, ibm10738249, JSA10851, JSA10990, openSUSE-SU-2017:3192-1, openSUSE-SU-2018:0029-1, openSUSE-SU-2018:0315-1, RHSA-2018:3221-01, SA157, SB10211, SUSE-SU-2017:2968-1, SUSE-SU-2017:2981-1, SUSE-SU-2018:0112-1, SUSE-SU-2019:14246-1, TNS-2017-15, USN-3475-1, VIGILANCE-VUL-24317
OpenSSL: Man-in-the-Middle via bn_sqrx8x_internal
An attacker can act as a Man-in-the-Middle and use a carry error of bn_sqrx8x_internal() on OpenSSL, in order to read or write data in the session...
2012827, 2013025, 2014202, 2014651, 2014669, 2015080, bulletinapr2018, bulletinjan2018, CERTFR-2017-AVI-391, cpuapr2018, cpuapr2019, cpujan2018, cpujan2019, cpujul2018, cpujul2019, cpuoct2018, CVE-2017-3736, DSA-4017-1, DSA-4018-1, FEDORA-2017-4cf72e2c11, FEDORA-2017-512a6c5aae, FEDORA-2017-55a3247cfd, FEDORA-2017-7f30914972, FEDORA-2017-dbec196dd8, FreeBSD-SA-17:11.openssl, ibm10715641, ibm10719113, ibm10732391, ibm10733905, ibm10738249, ibm10738401, JSA10851, K14363514, openSUSE-SU-2017:3192-1, openSUSE-SU-2018:0029-1, openSUSE-SU-2018:0315-1, RHSA-2018:0998-01, RHSA-2018:2568-01, RHSA-2018:2575-01, SA157, SB10211, SB10220, SSA:2017-306-02, STORM-2017-006, SUSE-SU-2018:2839-1, SUSE-SU-2018:3082-1, SUSE-SU-2019:14246-1, TNS-2017-15, USN-3475-1, VIGILANCE-VUL-24316
OpenSSL: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenSSL...
1117414, 2000544, 2000988, 2000990, 2002331, 2004036, 2004940, 2009389, 2010154, 2011567, 2012827, 2014202, 2014651, 2014669, 2015080, BSA-2016-204, BSA-2016-207, BSA-2016-211, BSA-2016-212, BSA-2016-213, BSA-2016-216, BSA-2016-234, bulletinapr2017, bulletinjan2018, bulletinoct2017, CERTFR-2017-AVI-035, CERTFR-2018-AVI-343, cisco-sa-20170130-openssl, cpuapr2017, cpuapr2019, cpujan2018, cpujul2017, cpujul2018, cpuoct2017, CVE-2016-7055, CVE-2017-3730, CVE-2017-3731, CVE-2017-3732, DLA-814-1, DSA-2020-062, DSA-3773-1, FEDORA-2017-3451dbec48, FEDORA-2017-e853b4144f, FG-IR-17-019, FreeBSD-SA-17:02.openssl, ibm10732391, ibm10733905, ibm10738249, ibm10738401, JSA10775, JSA10990, K37526132, K43570545, K44512851, K-510805, NTAP-20170127-0001, NTAP-20170310-0002, NTAP-20180201-0001, openSUSE-SU-2017:0481-1, openSUSE-SU-2017:0487-1, openSUSE-SU-2017:0527-1, openSUSE-SU-2017:0941-1, openSUSE-SU-2017:2011-1, openSUSE-SU-2017:2868-1, openSUSE-SU-2018:0458-1, PAN-70674, PAN-73914, PAN-SA-2017-0012, PAN-SA-2017-0014, PAN-SA-2017-0016, RHSA-2017:0286-01, RHSA-2018:2568-01, RHSA-2018:2575-01, SA141, SA40423, SB10188, SSA:2017-041-02, SUSE-SU-2018:0112-1, SUSE-SU-2018:2839-1, SUSE-SU-2018:3082-1, TNS-2017-03, USN-3181-1, VIGILANCE-VUL-21692
Our database contains other pages. You can request a free trial to read them.

Display information about stunnel: