stunnel 4.46 < 5.34 Improper Level 4 Peer Certificate Validation Security Bypass

critical Nessus Plugin ID 92557

Synopsis

An application installed on the remote host is affected by a security bypass vulnerability.

Description

The version of stunnel installed on the remote host is 4.46 or later but prior to 5.34. It is, therefore, affected by a security bypass vulnerability related to the validation of level 4 peer certificates.
An unauthenticated, remote attacker can exploit this to have an impact on confidentiality, integrity, and/or availability. No other details are available.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to stunnel version 5.34 or later.

See Also

https://www.stunnel.org/sdf_ChangeLog.html

Plugin Details

Severity: Critical

ID: 92557

File Name: stunnel_5_34.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 7/26/2016

Updated: 8/8/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:stunnel:stunnel

Required KB Items: installed_sw/stunnel

Patch Publication Date: 7/5/2016

Vulnerability Publication Date: 7/5/2016