This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing a security update.
Updated stunnel packages fix security vulnerability :
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM
authentication are enabled, does not correctly perform integer
conversion, which allows remote proxy servers to execute arbitrary
code via a crafted request that triggers a buffer overflow
The updated packages also fixes the following :
- move library subpackages back into main stunnel package
- add a systemd unit file (partially fixing Bug 3951)
- fix issues with stunnel.conf and stunnel.pem, with
stunnel running in a chroot environment.
See also :
Update the affected stunnel package.
Risk factor :
Medium / CVSS Base Score : 6.6
CVSS Temporal Score : 5.7
Public Exploit Available : true