stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2013:130 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-0714.html | vendor advisory |
https://www.stunnel.org/CVE-2013-1762.html | vendor advisory |
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0097 | |
http://www.debian.org/security/2013/dsa-2664 | vendor advisory |