stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
Max CVSS
6.6
EPSS Score
0.95%
Published
2013-03-08
Updated
2014-01-17
Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
Max CVSS
7.5
EPSS Score
1.08%
Published
2002-01-31
Updated
2017-10-10
2 vulnerabilities found