The OCSP functionality in stunnel before 4.24 does not properly search certificate revocation lists (CRL), which allows remote attackers to bypass intended access restrictions by using revoked certificates.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/30425 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42528 | vdb entry |
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00942.html | vendor advisory |
http://www.vupen.com/english/advisories/2008/1569/references | vdb entry |
http://secunia.com/advisories/30335 | third party advisory vendor advisory |
http://secunia.com/advisories/31438 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00856.html | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:168 | vendor advisory |
http://stunnel.mirt.net/pipermail/stunnel-announce/2008-May/000035.html | mailing list |
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00907.html | vendor advisory |
http://security.gentoo.org/glsa/glsa-200808-08.xml | vendor advisory |
http://www.securityfocus.com/bid/29309 | vdb entry patch |