CVE-2013-1762

EUVD-2013-1788
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
Affected Products (NVD)
VendorProductVersion
stunnelstunnel
𝑥
≤ 4.54
stunnelstunnel
4.21
stunnelstunnel
4.22
stunnelstunnel
4.23
stunnelstunnel
4.24
stunnelstunnel
4.25
stunnelstunnel
4.26
stunnelstunnel
4.27
stunnelstunnel
4.28
stunnelstunnel
4.29
stunnelstunnel
4.30
stunnelstunnel
4.31
stunnelstunnel
4.32
stunnelstunnel
4.33
stunnelstunnel
4.34
stunnelstunnel
4.35
stunnelstunnel
4.36
stunnelstunnel
4.37
stunnelstunnel
4.38
stunnelstunnel
4.39
stunnelstunnel
4.40
stunnelstunnel
4.41
stunnelstunnel
4.42
stunnelstunnel
4.43
stunnelstunnel
4.44
stunnelstunnel
4.45
stunnelstunnel
4.46
stunnelstunnel
4.47
stunnelstunnel
4.48
stunnelstunnel
4.49
stunnelstunnel
4.50
stunnelstunnel
4.51
stunnelstunnel
4.52
stunnelstunnel
4.53
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
stunnel4
bookworm
3:5.68-2+deb12u1
fixed
bullseye
3:5.56+dfsg-10
fixed
sid
3:5.73-1
fixed
trixie
3:5.73-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
stunnel4
hardy
ignored
lucid
Fixed 3:4.29-1+squeeze1build0.10.04.1
released
oneiric
ignored
precise
Fixed 3:4.42-1ubuntu0.1
released
quantal
Fixed 3:4.53-1ubuntu0.1
released
raring
ignored
saucy
not-affected