Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
http://www.debian.org/security/2015/dsa-3299 | vendor advisory |
http://www.securityfocus.com/bid/74659 | vdb entry |
https://www.stunnel.org/CVE-2015-3644.html | patch vendor advisory |
http://www.securitytracker.com/id/1032324 | vdb entry |