stunnel < 4.23 Local Privilege Escalation

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

A remote Windows host contains a program that is affected by a local
privilege escalation vulnerability.

Description :

The remote host is running stunnel, an application for encrypting
arbitrary network connections with SSL.

The version of stunnel installed on the remote host, when running as a
service, allows a local user to gain LocalSystem privileges due to an
unspecified error.

See also :

http://www.stunnel.org/news/
http://www.nessus.org/u?1def20e3

Solution :

Upgrade to stunnel version 4.23 or later.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 32394 ()

Bugtraq ID: 29285

CVE ID: CVE-2008-2400

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now