RHEL 2.1 : stunnel (RHSA-2003:297)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated stunnel packages are now available. These updates address
problems stemming from improper use of non-reentrant functions in
signal handlers.

Stunnel is a wrapper for network connections. It can be used to tunnel
an unencrypted network connection over an encrypted connection
(encrypted using SSL or TLS) or to provide an encrypted means of
connecting to services that do not natively support encryption.

A previous advisory provided updated packages to address re-entrancy
problems in stunnel's signal-handling routines. These updates did not
address other bugs that were found by Steve Grubb, and introduced an
additional bug, which was fixed in stunnel 3.26.

All users should upgrade to these errata packages, which address these
issues by updating stunnel to version 3.26.

NOTE: After upgrading, any instances of stunnel configured to run in
daemon mode should be restarted, and any active network connections
that are currently being serviced by stunnel should be terminated and

See also :


Solution :

Update the affected stunnel package.

Risk factor :

Medium / CVSS Base Score : 4.6

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12426 ()

Bugtraq ID:

CVE ID: CVE-2003-0740

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial