stunnel < 5.01 OpenSSL Heartbeat Information Disclosure (Heartbleed)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a program that is affected by an
information disclosure vulnerability.

Description :

The version of stunnel installed on the remote host is prior to
version 5.01. It is, therefore, affected by an information disclosure
vulnerability in the bundled OpenSSL DLLs. A remote attacker can read
the contents of up to 64KB of server memory, potentially exposing
passwords, private keys, and other sensitive data.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://stunnel.org/?page=sdf_ChangeLog
http://www.nessus.org/u?52a6ced6
http://www.heartbleed.com
https://eprint.iacr.org/2014/140
https://www.openssl.org/news/vulnerabilities.html#2014-0160
https://www.openssl.org/news/secadv/20140407.txt

Solution :

Upgrade to stunnel version 5.01 or later.

Risk factor :

High / CVSS Base Score : 9.4
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N)
CVSS Temporal Score : 7.4
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 73500 ()

Bugtraq ID: 66690

CVE ID: CVE-2014-0160

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now