stunnel < 5.00 PRNG State Security Weakness

Medium Nessus Plugin ID 73212


The remote Windows host contains a program that is affected by a security weakness.


The version of stunnel installed on the remote host is prior to version 5.00. It is, therefore, affected by a security weakness due to the PRNG state not being reset for new connections where the server forks. A remote attacker can exploit this issue to disclose sensitive information, such as the private key used for EC (ECDSA) or DSA certificates.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to stunnel version 5.00 or later.

See Also

Plugin Details

Severity: Medium

ID: 73212

File Name: stunnel_5_00.nasl

Version: $Revision: 1.5 $

Type: local

Agent: windows

Family: Windows

Published: 2014/03/26

Modified: 2016/07/29

Dependencies: 65689

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:stunnel:stunnel

Required KB Items: installed_sw/stunnel

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/03/06

Vulnerability Publication Date: 2014/03/04

Reference Information

CVE: CVE-2014-0016

BID: 65964

OSVDB: 104043