RHEL 2.1 : stunnel (RHSA-2003:297)

Medium Nessus Plugin ID 12426


The remote Red Hat host is missing a security update.


Updated stunnel packages are now available. These updates address problems stemming from improper use of non-reentrant functions in signal handlers.

Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption.

A previous advisory provided updated packages to address re-entrancy problems in stunnel's signal-handling routines. These updates did not address other bugs that were found by Steve Grubb, and introduced an additional bug, which was fixed in stunnel 3.26.

All users should upgrade to these errata packages, which address these issues by updating stunnel to version 3.26.

NOTE: After upgrading, any instances of stunnel configured to run in daemon mode should be restarted, and any active network connections that are currently being serviced by stunnel should be terminated and reestablished.


Update the affected stunnel package.

See Also






Plugin Details

Severity: Medium

ID: 12426

File Name: redhat-RHSA-2003-297.nasl

Version: $Revision: 1.20 $

Type: local

Agent: unix

Published: 2004/07/06

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:stunnel, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2003/11/12

Vulnerability Publication Date: 2003/09/03

Reference Information

CVE: CVE-2003-0740

OSVDB: 6451

RHSA: 2003:297