cpe:2.3:a:stunnel:stunnel:3.14:*:*:*:*:*:*:*
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
Max CVSS
6.6
EPSS Score
0.95%
Published
2013-03-08
Updated
2014-01-17
Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
Max CVSS
7.5
EPSS Score
1.08%
Published
2002-01-31
Updated
2017-10-10
2 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!