stunnel 4.46 < 5.34 Improper Level 4 Peer Certificate Validation Security Bypass

Critical Nessus Plugin ID 92557


An application installed on the remote host is affected by a security bypass vulnerability.


The version of stunnel installed on the remote host is 4.46 or later but prior to 5.34. It is, therefore, affected by a security bypass vulnerability related to the validation of level 4 peer certificates.
An unauthenticated, remote attacker can exploit this to have an impact on confidentiality, integrity, and/or availability. No other details are available.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to stunnel version 5.34 or later.

See Also

Plugin Details

Severity: Critical

ID: 92557

File Name: stunnel_5_34.nasl

Version: $Revision: 1.2 $

Type: local

Agent: windows

Family: Windows

Published: 2016/07/26

Modified: 2016/07/28

Dependencies: 65689

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:stunnel:stunnel

Required KB Items: installed_sw/stunnel

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/07/05

Vulnerability Publication Date: 2016/07/05

Reference Information

OSVDB: 141677